SlideShare a Scribd company logo
1
The webinar will begin shortly…
You can join either by VoIP or dial in
by telephone
Follow call in details if you select
to use Telephone audio
Cybersecurity and the Regulator,
What You Need to Know
July 24, 2014
Presented By:
Patrick Shea
Partner, Cordium
James Hogbin
Director, IP Sentinel
Agenda
o Regulatory Focus on Cybersecurity
o Key Concerns Related to Financial Services
o Basic Practices
o Steps to be Taking
o Risk Assessment
o Controls related to 3rd
Party Providers
o Dealing with an “Incident”
o Insurance
o Training, Testing and Monitoring
o Why Security
o Threat Surface
o Protecting What
o From Who
o Security Posture
o Forensic Readiness
o Security Operations
o What do bad actors do & how to catch them
o Checklist
4
Questions
5
You can submit your questions
using the Questions area in the
GoToWebinar console
You can submit your questions
using the Questions area in the
GoToWebinar console
© Copyright
Part One
Patrick Shea
Partner, Cordium
patrick.shea@cordium.com
6
Agenda – Part One
o Regulatory Focus on Cybersecurity
o Key Concerns Related to Financial Services
o Basic Practices
o Steps to be Taking
o Risk Assessment
o Controls related to 3rd
Party Providers
o Dealing with an “Incident”
o Insurance
o Training, Testing and Monitoring
7
Regulatory Focus on Cybersecurity
o Governments
o EU : Cyber Security Strategy
o US : The Comprehensive National Cybersecurity Initiative
o UK : Office of Cyber Security and Information Assurance
o Regulators
o CFTC : Staff Advisory No. 14-21 Gramm-Leach-Bliley Act Security
Safeguards
o SEC : OCIE Cybersecurity Initiative
o FCA : FCA Risk Outlook 2014
8
Regulatory Focus on Cybersecurity
o SEC/OCIE Examination Priorities for 2014 include focus on
technology, including cybersecurity preparedness.
o January 2014, FINRA announces targeted exam assessing its
regulated firms’ approaches to managing cybersecurity threats.
o Gather a better understanding and share findings with regulated firms.
o March 2014 - SEC Sponsors Cybersecurity Roundtable
o Cyber threats are "first on the Division of Intelligence’s list of global threats,
even surpassing terrorism.”
SEC Chair Mary Jo White (Roundtable opening remarks).
9
Regulatory Focus on Cybersecurity
o April 2014 Risk Alert from the SEC outlines OCIE’s cybersecurity
initiative:
o Examinations of more than 50 BDs and RIAs focused on:
o Entity’s cybersecurity governance;
o Identification and assessment of cybersecurity risks;
o Protection of networks and information;
o Risks associated with remote customer access and funds transfer requests;
o Risks associated with vendors and other third parties;
o Detection of unauthorized activity; and
o Experiences with certain cybersecurity threats.
o Risk Alert included a sample document request, to be used during exams.
Provided to raise awareness and empower compliance professionals.
10
Key concerns
o Financial services sector is vulnerable
o Perception that cybersecurity is lacking and need to raise awareness
o Client data at risk – Consumer Protection
o Well-established reliance on service providers
o Sensitive data being transferred & 3rd
party security protocols critical
o Hackers with the upper-hand
o “Insider” Risk
o Employees do things (intentionally or unintentionally)
that compromise the firm’s security.
11
Basic Practices
o Holistic approach needed.
o Threat to cybersecurity is NOT just an IT issue;
o Business issue & should be part of your firm’s risk
management function.
o Top-down approach to cybersecurity!
o Create & perpetuate a culture of involvement and
awareness.
o Everyone at the firm should be involved, educated and regularly
trained.
o Policies and procedures to be reviewed, upgraded & tailored to
your firm.
o Past intrusions/breaches? Learn from them.
12
Steps to be Taking: Risk Assessment
o Identify your cybersecurity & physical threats, vulnerabilities and
potential consequences to your business.
o Determine what you have in place today with respect to
cybersecurity.
o What needs to be protected?
o How are you presently managing/monitoring security?
o What technology?
o Who is responsible?
o How are you managing employee access to the systems/data?
o What data is leaving the firm? Where it is going?
o Answers to these questions help drive your Written Information
Security Policy (“WISP”).
13
Steps to be Taking: Controls related to 3rd
Party
Providers
o Need to understand cybersecurity policies and procedures of your
vendors & key service providers
o Focus on vendors with access to your network, customer data and/or other
sensitive information
o Gather their WISP and related documentation
o Best practice – Questionnaire to be sent to vendors
o Perform due diligence on, and monitor, their practices
o Review your contracts with those vendors
o Try and negotiate for prompt notice of any
material incidents
14
Steps to be Taking: Dealing with an “Incident”
o Simulations are an opportunity to test your plan “in action”
o Detecting & reporting unauthorized activity
o Monitoring system (Who? What? How?)
o Develop clear escalation procedures and robust cyber-incidence
response plans.
o Information sharing = Transparency
o FINRA notification requirements
o OCIE wants to hear about significant issues and data breaches
o Information-sharing arrangements with law enforcement such as the FBI?
o Possible reporting at State-level
o Disclosure to investors/clients needed?
15
Steps to be Taking: Insurance
o Cyber liability insurance protection -- important step
o Review your current policies
o SEC Risk Alert
o Do you maintain insurance that specifically covers losses and expenses
attributable to cybersecurity threats?
o Know what is covered & what is excluded
o If/when you file claims, document the issues and the resolution
16
Steps to be Taking: Training, Testing &
Monitoring
o Educate all employees on risks & responses
o Front line defense
o Help employees stay vigilent & teach them what to do if the spot an issue
o Bring your plan to life through routine testing
o Part of your risk-assessment plan
o Focus on key risks as relating to your business
o Develop a monitoring program so risks and/or breaches
can be promptly identified, reviewed and resolved.
o Don’t stop there – document & consider whether you
need to report to authorities and/or clients.
17
Part Two
James Hogbin
Director, IP Sentinel
james@ip-sentinel.com
18
Agenda – Part Two
o Why Security
o Threat Surface
o Protecting What
o From Who
o Security Posture
o Forensic Readiness
o Security Operations
o What do bad actors do & how to catch them
o Checklist
19
The Facts
o If a skilled hacker/state actor wants to get in to your
systems they will.
o The biggest threat is your existing staff.
o It is a case of when, not if.
o It is still important to try to prevent breaches,
when they happen it is essential to
detect them, know their scope and
be able to remediate the damage.
20
Why Security?
o Government & Regulatory Focus (discussed above)
o Market Participants
“Cyber-crime, Securities Markets and Systemic Risk”
CPSS-IOSCO & World Federation of Exchanges (WFE)
53 % of 46 exchanges surveyed had been subject to a cyber-attack over the preceding
12 months.
“Beyond the Horizon: A White Paper to the Industry on Systemic risk”
Depository Trust & Clearing Corporation (DTCC)
Identified cyber-crime as the biggest threat to market stability, putting it ahead of
counterparty risk and concentration risk at central counterparty clearing houses
(CCPs).
“70% of managers do not feel ‘well prepared’ to deal with a cyber-security threat.”
cooconnect.com 2014
21
Threat Surface
22
Protecting What?
o Company Information
o Trading Models
o CRM Data – Clients & Prospects
o Investment Agreements
o Trading Arrangements
o Personnel Information
o Company Brand
o Company Systems
o Bank Accounts/Payroll
o Trading Infrastructure
o Payment Processing
23
From Who?
Information Leakage
oEmployees - 37% of the time
o Mistake
o Deliberate
oSystem Glitch – 29% of the time
oExternal Bad Actors – 34% of the time
o Malware
o Ransomware
o Remote Access/Control
o Fraud
o Theft
o Processing Cycles – Bitcoin mining
o Data Storage - Hosting Illegal content
o Network Capacity - DDoS
24
Security Posture
Traditional “Citadel” approach
o Hard outer shell
o Soft core
Once you’re in you’re in!
Current Thinking
o Layered security
o Digital Sand Traps
o SIEM = Log Aggregation & Monitoring
o TRAINING
It will happen so be prepared
25
Security Operations
o How does a good hacker behave
o As a normal employee NOT L33t Hax0r
o Nothing obviously out of the ordinary
o Will attempt to
o Enter, Elevate Privileges, Retain Access
o Look for Odd usage patterns.
o e.g. Dev user looking at Sales.xls
o Logins @ odd times
o Sequential access to systems
o Unusual Traffic to or from devices
o Network or Protocol (SNMP, HTTP)
o Unusual services on devices
o Web server, ssh, rdp etc
26
Security Operations
o How to frustrate L33t Hax0rs
o Staff Training
o Segmented Networks with Air Gaps
o Regular Internal Device Asset scans
o Multi layer security
o Keep everything patched
o Remove server banner information
o Outbound as well as inbound firewall
27
Security Operations
o How to find them
o Staff Training
o Treat the entire thing as insider threat
o Because it is.
o Centralise Log Management & use it
o http://fingerprint.ip-sentinel.com
user=demo, password=demo
o Detect rate based metrics across environment
o Honey trap servers
o Seed CRM data
o Network traffic/protocol analysis & monitoring
o Regular Device service scanning
o Firewall/web proxy configuration
28
Hackers need only be
lucky once, you have to
be good all the time.
29
Questions?
30
Questions
31
You can submit your questions
using the Questions area in the
GoToWebinar console
You can submit your questions
using the Questions area in the
GoToWebinar console
© Copyright

More Related Content

What's hot

Cfe prep course
Cfe prep courseCfe prep course
Aml services
Aml servicesAml services
Aml services
Adnan Tabassum
 
Inside Bitcoins_Shapiro
Inside Bitcoins_ShapiroInside Bitcoins_Shapiro
Inside Bitcoins_Shapiro
Mediabistro
 
Chapter 8 career and professional development
Chapter 8   career and professional developmentChapter 8   career and professional development
Chapter 8 career and professional development
Quan Risk
 
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
BillyCheuk
 
Cordium's Annual Regulatory Forum full presentation 2014
Cordium's Annual Regulatory Forum full presentation 2014 Cordium's Annual Regulatory Forum full presentation 2014
Cordium's Annual Regulatory Forum full presentation 2014 Cordium
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
Scott Swanson , CFE, CFCI
 
Fraud Control Framework
Fraud Control FrameworkFraud Control Framework
Fraud Control Framework
Ravi Nayak
 
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
PECB
 
ICIL IT Enabled Services
ICIL IT Enabled ServicesICIL IT Enabled Services
ICIL IT Enabled Services
Adnan Tabassum
 
Forensic Data Analysis Services
Forensic Data Analysis ServicesForensic Data Analysis Services
Forensic Data Analysis Services
BDO Indonesia
 
Cross Border M&A
Cross Border M&ACross Border M&A
Cross Border M&A
Eversheds Sutherland
 
Operational innovations in AML/CFT compliance processes and financial inclus...
Operational innovations in AML/CFT  compliance processes and financial inclus...Operational innovations in AML/CFT  compliance processes and financial inclus...
Operational innovations in AML/CFT compliance processes and financial inclus...
CGAP
 
Annex IV - The next chapter in AIFMD
Annex IV - The next chapter in AIFMDAnnex IV - The next chapter in AIFMD
Annex IV - The next chapter in AIFMD
Cordium
 
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsFCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
PECB
 
Chapter 6 aml compliance programme
Chapter 6   aml compliance programmeChapter 6   aml compliance programme
Chapter 6 aml compliance programme
Quan Risk
 
Streamlining for success: M&A divestment and separation trends
Streamlining for success: M&A divestment and separation trendsStreamlining for success: M&A divestment and separation trends
Streamlining for success: M&A divestment and separation trends
Eversheds Sutherland
 
Countering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective TrainingCountering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective Training
Aperio Intelligence
 
Mutual Evaluation Report of China, 2019 - Ratings
Mutual Evaluation Report of China, 2019 -  RatingsMutual Evaluation Report of China, 2019 -  Ratings
Mutual Evaluation Report of China, 2019 - Ratings
FATF - Financial Action Task Force
 

What's hot (19)

Cfe prep course
Cfe prep courseCfe prep course
Cfe prep course
 
Aml services
Aml servicesAml services
Aml services
 
Inside Bitcoins_Shapiro
Inside Bitcoins_ShapiroInside Bitcoins_Shapiro
Inside Bitcoins_Shapiro
 
Chapter 8 career and professional development
Chapter 8   career and professional developmentChapter 8   career and professional development
Chapter 8 career and professional development
 
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
 
Cordium's Annual Regulatory Forum full presentation 2014
Cordium's Annual Regulatory Forum full presentation 2014 Cordium's Annual Regulatory Forum full presentation 2014
Cordium's Annual Regulatory Forum full presentation 2014
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
 
Fraud Control Framework
Fraud Control FrameworkFraud Control Framework
Fraud Control Framework
 
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
 
ICIL IT Enabled Services
ICIL IT Enabled ServicesICIL IT Enabled Services
ICIL IT Enabled Services
 
Forensic Data Analysis Services
Forensic Data Analysis ServicesForensic Data Analysis Services
Forensic Data Analysis Services
 
Cross Border M&A
Cross Border M&ACross Border M&A
Cross Border M&A
 
Operational innovations in AML/CFT compliance processes and financial inclus...
Operational innovations in AML/CFT  compliance processes and financial inclus...Operational innovations in AML/CFT  compliance processes and financial inclus...
Operational innovations in AML/CFT compliance processes and financial inclus...
 
Annex IV - The next chapter in AIFMD
Annex IV - The next chapter in AIFMDAnnex IV - The next chapter in AIFMD
Annex IV - The next chapter in AIFMD
 
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsFCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
 
Chapter 6 aml compliance programme
Chapter 6   aml compliance programmeChapter 6   aml compliance programme
Chapter 6 aml compliance programme
 
Streamlining for success: M&A divestment and separation trends
Streamlining for success: M&A divestment and separation trendsStreamlining for success: M&A divestment and separation trends
Streamlining for success: M&A divestment and separation trends
 
Countering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective TrainingCountering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective Training
 
Mutual Evaluation Report of China, 2019 - Ratings
Mutual Evaluation Report of China, 2019 -  RatingsMutual Evaluation Report of China, 2019 -  Ratings
Mutual Evaluation Report of China, 2019 - Ratings
 

Viewers also liked

UK Regulatory Agenda for Investment Managers 2014
UK Regulatory Agenda for Investment Managers 2014UK Regulatory Agenda for Investment Managers 2014
UK Regulatory Agenda for Investment Managers 2014Cordium
 
Cordium Software
Cordium SoftwareCordium Software
Cordium SoftwareCordium
 
Top tax tips 2014
Top tax tips 2014Top tax tips 2014
Top tax tips 2014Cordium
 
'More Rough Winds that shake the darling Buds of May' Breakfast Seminar, 20th...
'More Rough Winds that shake the darling Buds of May' Breakfast Seminar, 20th...'More Rough Winds that shake the darling Buds of May' Breakfast Seminar, 20th...
'More Rough Winds that shake the darling Buds of May' Breakfast Seminar, 20th...
Cordium
 
What to expect when expecting the SEC
What to expect when expecting the SECWhat to expect when expecting the SEC
What to expect when expecting the SECCordium
 
AIFMD Surgery Webinar Depositaries
AIFMD Surgery Webinar DepositariesAIFMD Surgery Webinar Depositaries
AIFMD Surgery Webinar DepositariesCordium
 
Compliance Monitoring as an AIFM
Compliance Monitoring as an AIFMCompliance Monitoring as an AIFM
Compliance Monitoring as an AIFM
Cordium
 

Viewers also liked (7)

UK Regulatory Agenda for Investment Managers 2014
UK Regulatory Agenda for Investment Managers 2014UK Regulatory Agenda for Investment Managers 2014
UK Regulatory Agenda for Investment Managers 2014
 
Cordium Software
Cordium SoftwareCordium Software
Cordium Software
 
Top tax tips 2014
Top tax tips 2014Top tax tips 2014
Top tax tips 2014
 
'More Rough Winds that shake the darling Buds of May' Breakfast Seminar, 20th...
'More Rough Winds that shake the darling Buds of May' Breakfast Seminar, 20th...'More Rough Winds that shake the darling Buds of May' Breakfast Seminar, 20th...
'More Rough Winds that shake the darling Buds of May' Breakfast Seminar, 20th...
 
What to expect when expecting the SEC
What to expect when expecting the SECWhat to expect when expecting the SEC
What to expect when expecting the SEC
 
AIFMD Surgery Webinar Depositaries
AIFMD Surgery Webinar DepositariesAIFMD Surgery Webinar Depositaries
AIFMD Surgery Webinar Depositaries
 
Compliance Monitoring as an AIFM
Compliance Monitoring as an AIFMCompliance Monitoring as an AIFM
Compliance Monitoring as an AIFM
 

Similar to Cybersecurity and the regulator, what you need to know

Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
Dan Michaluk
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
Dan Michaluk
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
Sami Benafia
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Shawn Tuma
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
Shawn Tuma
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Dan Michaluk
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Clio - Cloud-Based Legal Technology
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
Dan Michaluk
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
CSNP
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
Forcepoint LLC
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
Shawn Tuma
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
Shawn Tuma
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
TechSoup Canada
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
bugcrowd
 
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Lucien Pierce
 

Similar to Cybersecurity and the regulator, what you need to know (20)

Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Cybersecurity and the regulator, what you need to know

  • 1. 1
  • 2. The webinar will begin shortly… You can join either by VoIP or dial in by telephone Follow call in details if you select to use Telephone audio
  • 3. Cybersecurity and the Regulator, What You Need to Know July 24, 2014 Presented By: Patrick Shea Partner, Cordium James Hogbin Director, IP Sentinel
  • 4. Agenda o Regulatory Focus on Cybersecurity o Key Concerns Related to Financial Services o Basic Practices o Steps to be Taking o Risk Assessment o Controls related to 3rd Party Providers o Dealing with an “Incident” o Insurance o Training, Testing and Monitoring o Why Security o Threat Surface o Protecting What o From Who o Security Posture o Forensic Readiness o Security Operations o What do bad actors do & how to catch them o Checklist 4
  • 5. Questions 5 You can submit your questions using the Questions area in the GoToWebinar console You can submit your questions using the Questions area in the GoToWebinar console © Copyright
  • 6. Part One Patrick Shea Partner, Cordium patrick.shea@cordium.com 6
  • 7. Agenda – Part One o Regulatory Focus on Cybersecurity o Key Concerns Related to Financial Services o Basic Practices o Steps to be Taking o Risk Assessment o Controls related to 3rd Party Providers o Dealing with an “Incident” o Insurance o Training, Testing and Monitoring 7
  • 8. Regulatory Focus on Cybersecurity o Governments o EU : Cyber Security Strategy o US : The Comprehensive National Cybersecurity Initiative o UK : Office of Cyber Security and Information Assurance o Regulators o CFTC : Staff Advisory No. 14-21 Gramm-Leach-Bliley Act Security Safeguards o SEC : OCIE Cybersecurity Initiative o FCA : FCA Risk Outlook 2014 8
  • 9. Regulatory Focus on Cybersecurity o SEC/OCIE Examination Priorities for 2014 include focus on technology, including cybersecurity preparedness. o January 2014, FINRA announces targeted exam assessing its regulated firms’ approaches to managing cybersecurity threats. o Gather a better understanding and share findings with regulated firms. o March 2014 - SEC Sponsors Cybersecurity Roundtable o Cyber threats are "first on the Division of Intelligence’s list of global threats, even surpassing terrorism.” SEC Chair Mary Jo White (Roundtable opening remarks). 9
  • 10. Regulatory Focus on Cybersecurity o April 2014 Risk Alert from the SEC outlines OCIE’s cybersecurity initiative: o Examinations of more than 50 BDs and RIAs focused on: o Entity’s cybersecurity governance; o Identification and assessment of cybersecurity risks; o Protection of networks and information; o Risks associated with remote customer access and funds transfer requests; o Risks associated with vendors and other third parties; o Detection of unauthorized activity; and o Experiences with certain cybersecurity threats. o Risk Alert included a sample document request, to be used during exams. Provided to raise awareness and empower compliance professionals. 10
  • 11. Key concerns o Financial services sector is vulnerable o Perception that cybersecurity is lacking and need to raise awareness o Client data at risk – Consumer Protection o Well-established reliance on service providers o Sensitive data being transferred & 3rd party security protocols critical o Hackers with the upper-hand o “Insider” Risk o Employees do things (intentionally or unintentionally) that compromise the firm’s security. 11
  • 12. Basic Practices o Holistic approach needed. o Threat to cybersecurity is NOT just an IT issue; o Business issue & should be part of your firm’s risk management function. o Top-down approach to cybersecurity! o Create & perpetuate a culture of involvement and awareness. o Everyone at the firm should be involved, educated and regularly trained. o Policies and procedures to be reviewed, upgraded & tailored to your firm. o Past intrusions/breaches? Learn from them. 12
  • 13. Steps to be Taking: Risk Assessment o Identify your cybersecurity & physical threats, vulnerabilities and potential consequences to your business. o Determine what you have in place today with respect to cybersecurity. o What needs to be protected? o How are you presently managing/monitoring security? o What technology? o Who is responsible? o How are you managing employee access to the systems/data? o What data is leaving the firm? Where it is going? o Answers to these questions help drive your Written Information Security Policy (“WISP”). 13
  • 14. Steps to be Taking: Controls related to 3rd Party Providers o Need to understand cybersecurity policies and procedures of your vendors & key service providers o Focus on vendors with access to your network, customer data and/or other sensitive information o Gather their WISP and related documentation o Best practice – Questionnaire to be sent to vendors o Perform due diligence on, and monitor, their practices o Review your contracts with those vendors o Try and negotiate for prompt notice of any material incidents 14
  • 15. Steps to be Taking: Dealing with an “Incident” o Simulations are an opportunity to test your plan “in action” o Detecting & reporting unauthorized activity o Monitoring system (Who? What? How?) o Develop clear escalation procedures and robust cyber-incidence response plans. o Information sharing = Transparency o FINRA notification requirements o OCIE wants to hear about significant issues and data breaches o Information-sharing arrangements with law enforcement such as the FBI? o Possible reporting at State-level o Disclosure to investors/clients needed? 15
  • 16. Steps to be Taking: Insurance o Cyber liability insurance protection -- important step o Review your current policies o SEC Risk Alert o Do you maintain insurance that specifically covers losses and expenses attributable to cybersecurity threats? o Know what is covered & what is excluded o If/when you file claims, document the issues and the resolution 16
  • 17. Steps to be Taking: Training, Testing & Monitoring o Educate all employees on risks & responses o Front line defense o Help employees stay vigilent & teach them what to do if the spot an issue o Bring your plan to life through routine testing o Part of your risk-assessment plan o Focus on key risks as relating to your business o Develop a monitoring program so risks and/or breaches can be promptly identified, reviewed and resolved. o Don’t stop there – document & consider whether you need to report to authorities and/or clients. 17
  • 18. Part Two James Hogbin Director, IP Sentinel james@ip-sentinel.com 18
  • 19. Agenda – Part Two o Why Security o Threat Surface o Protecting What o From Who o Security Posture o Forensic Readiness o Security Operations o What do bad actors do & how to catch them o Checklist 19
  • 20. The Facts o If a skilled hacker/state actor wants to get in to your systems they will. o The biggest threat is your existing staff. o It is a case of when, not if. o It is still important to try to prevent breaches, when they happen it is essential to detect them, know their scope and be able to remediate the damage. 20
  • 21. Why Security? o Government & Regulatory Focus (discussed above) o Market Participants “Cyber-crime, Securities Markets and Systemic Risk” CPSS-IOSCO & World Federation of Exchanges (WFE) 53 % of 46 exchanges surveyed had been subject to a cyber-attack over the preceding 12 months. “Beyond the Horizon: A White Paper to the Industry on Systemic risk” Depository Trust & Clearing Corporation (DTCC) Identified cyber-crime as the biggest threat to market stability, putting it ahead of counterparty risk and concentration risk at central counterparty clearing houses (CCPs). “70% of managers do not feel ‘well prepared’ to deal with a cyber-security threat.” cooconnect.com 2014 21
  • 23. Protecting What? o Company Information o Trading Models o CRM Data – Clients & Prospects o Investment Agreements o Trading Arrangements o Personnel Information o Company Brand o Company Systems o Bank Accounts/Payroll o Trading Infrastructure o Payment Processing 23
  • 24. From Who? Information Leakage oEmployees - 37% of the time o Mistake o Deliberate oSystem Glitch – 29% of the time oExternal Bad Actors – 34% of the time o Malware o Ransomware o Remote Access/Control o Fraud o Theft o Processing Cycles – Bitcoin mining o Data Storage - Hosting Illegal content o Network Capacity - DDoS 24
  • 25. Security Posture Traditional “Citadel” approach o Hard outer shell o Soft core Once you’re in you’re in! Current Thinking o Layered security o Digital Sand Traps o SIEM = Log Aggregation & Monitoring o TRAINING It will happen so be prepared 25
  • 26. Security Operations o How does a good hacker behave o As a normal employee NOT L33t Hax0r o Nothing obviously out of the ordinary o Will attempt to o Enter, Elevate Privileges, Retain Access o Look for Odd usage patterns. o e.g. Dev user looking at Sales.xls o Logins @ odd times o Sequential access to systems o Unusual Traffic to or from devices o Network or Protocol (SNMP, HTTP) o Unusual services on devices o Web server, ssh, rdp etc 26
  • 27. Security Operations o How to frustrate L33t Hax0rs o Staff Training o Segmented Networks with Air Gaps o Regular Internal Device Asset scans o Multi layer security o Keep everything patched o Remove server banner information o Outbound as well as inbound firewall 27
  • 28. Security Operations o How to find them o Staff Training o Treat the entire thing as insider threat o Because it is. o Centralise Log Management & use it o http://fingerprint.ip-sentinel.com user=demo, password=demo o Detect rate based metrics across environment o Honey trap servers o Seed CRM data o Network traffic/protocol analysis & monitoring o Regular Device service scanning o Firewall/web proxy configuration 28
  • 29. Hackers need only be lucky once, you have to be good all the time. 29
  • 31. Questions 31 You can submit your questions using the Questions area in the GoToWebinar console You can submit your questions using the Questions area in the GoToWebinar console © Copyright