SlideShare a Scribd company logo
September 2015
CYBERSECURITY
BEST PRACTICES
IN FINANCIAL SERVICES
• Cybersecurity is of increasing importance to organizations in the
financial services industry
• It is not clear how aware the C suite is of their enterprise’s cyber
security programs, awareness of their strategy and tactics
• Cyber attacks pose a great threat to organizations, many of which
may not even know they have been victimized
• These incursions can disrupt business, steal and/or destroy data
• While many firms view cybersecurity as a technology and
compliance issue; in reality it should be viewed as a core business
risk
• It is essential that firms are proactive in their strategies to prevent
cyber attacks.
• This document will describe the current state of best practices for
cybersecurity within global financial services firms.
Cybersecurity Best Practices in Financial Services
Introduction
2
• The highest cybersecurity concerns surround network intrusions,
security breaches, the potential for theft, data corruption and
reputational damage
• Cyber attacks can encompass financial, technical, reputational
and/or regulatory threats
• There is a fine line between enforcing tight information security
controls and providing robust business value
• People are the weakest link in the cybersecurity chain; there is a
need for ongoing cybersecurity awareness and preparedness
training
• Firms should identify and segment the more significant key controls,
based on threat assessments (e.g., DDoS attacks, theft of data, data
corruption).
Cybersecurity Best Practices in Financial Services
Background
3
• Have a robust and ongoing cybersecurity test regime
• Cyber testing should be designed around potential and currently
unforeseen cyber incident scenarios
• Conduct penetration testing of enterprise systems and client-facing
systems, with penetration from both an external basis and an
internal basis
• Testing frameworks should be based on access to threat intelligence
and staff involvement in scope and testing.
Cybersecurity Best Practices in Financial Services
Background (Cont’d) …
4
• The persistent threat of cyber attacks makes managing risk a
greater focus than before
• To properly manage risk, firms must be proactive in their efforts to
prepare for potential attack scenarios by not only being ready for
them, but by actively searching for potential breaches and
successfully removing them.
Cybersecurity Best Practices in Financial Services
Proactive Cybersecurity
Risk Management
5
• Establish policies and procedures ahead of time, so you are not
improvising, should an attack occur
• Gather intelligence so you can identify high impact alerts and
prioritize what to tackle first
• Position equipment to analyze firewalls and logs to search for
anomalies
• Identify your major concerns, based on the security “CIA”
triumvirate:
– Confidentiality
– Availability
– Integrity
• Build these factors into your policy for protecting core systems
• Periodically conduct proactive scans
• Engage trusted experts to evaluate networks and systems.
Cybersecurity Best Practices in Financial Services
Cybersecurity Preparedness
6
1. Keep up with software patches – it doesn’t take long for hackers
to figure out what the hole is that the patch seeks to cover, and
they immediately develop tools to exploit it
2. Keep your online doors closed – many businesses do not know
how many computers they have, and sometimes they do not know
which are online. Computers that end up online when they
shouldn’t be are tempting targets for hackers; the Verizon Data
Breach Investigation Report in 2015 indicated that about 25% of
breaches were as a result of hackers getting in through a machine
that didn’t need to be online.
Cybersecurity Best Practices in Financial Services
Key Cybersecurity
Preparedness Areas
7
• People that add machines to the corporate network often do not
understand the security concerns. Many devices have default
passwords that can be found online.
• In other cases, companies have misconfigured anti-hacker
technologies to not watch traffic going in and out of such devices.
• The solution is to ensure that only necessary machines are online
and that they are protected.
3. Encrypt your data – if data is encrypted, there is not a lot that
hackers can do with it. You have to rely on technology rather than
people
4. Eliminate passwords – users hate them, security staff dread
them and hackers love them. Over 25% of breaches analyzed by
Verizon this year could have been stopped if the victimized company
required more than a password to enter its network.
Cybersecurity Best Practices in Financial Services
Key Cybersecurity Preparedness Areas (Cont’d) …
8
• Passwords are easy and can be used with any computer. Use of
tokens or biometric devices provides an added layer of protection.
5. Check out your vendors – smaller vendors and suppliers that
have access to corporate networks may not treat cybersecurity with the
same severity and urgency. Carful oversight ad vendor due diligence is
needed.
Cybersecurity Best Practices in Financial Services
Key Cybersecurity Preparedness Areas (Cont’d) …
9
1. Make the threat more personal
2. Make the protection more relevant and easy to understand
3. Reduce the number of steps
4. Provide an effective solution
5. Overcome cognitive barriers
Cybersecurity Best Practices in Financial Services
How to Increase Protection
Motivation with Staff
10
Source: Wall Street Journal Report on Information Security, April 20, 2015
1. Make the Threat More Personal
– Ask people questions that make the threat hit home (e.g., do
you want to know when someone is spying on you?)
– People are more likely to pay attention if they are prompted to
consider the possibility that their favorite retail outlet is the next
target
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
11
2. Make the Protection More Relevant and Easy to Understand:
– It is more difficult to deny threats when you can see yourself
being attacked or find out that you cannot depend on safety in
numbers
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
12
3. Reduce the Number of Steps:
– The less we do to gain security, the more likely we are to do it
– Systems could be designed so that computers do not have to
be plugged in to receive software downloads.
– Companies can reduce the need for users to act by making
antivirus software the default.
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
13
4. Provide an Effective Solution:
– When a practical solution is offered, we are more likely to
change our behavior
– E.g., the use of biometric readers - digital fingerprints are easy
and foolproof – fingerprints is hard to copy and never change.
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
14
5. Overcome Cognitive Barriers:
– The biggest barrier to cybersecurity guidelines is remembering
a random sequence of letters, numbers and symbols
– If a new password is difficult to remember, train staff to create
complex passwords they can remember, even if they are not
linked to personal information (e.g., iLove2Sleep247!)
– Pick something that makes you happy, because bundling
something positive with something negative is the best way to
make the negative thing less negative.
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
15
• Firms should develop a comprehensive testing strategy
• Testing should encompass both penetration testing and vulnerability
testing
• Conduct cybersecurity scenarios with the management team, via
table top “war room” exercises; they are relatively easy and cost-
effective to plan
• Think deviously when designing and planning scenario exercises!
• Penetration testing should be conducted no less than annually,
depending on the enterprise and the prevailing threat environment
• Vulnerability should be based on key controls
• Key control risks should be identified in impact analysis reviews with
the business units
Cybersecurity Best Practices in Financial Services
Cybersecurity Testing
and Preparedness
16
• The goal of penetration testing is to FIND vulnerabilities and FAIL.
• If testing illustrates that there are NO vulnerabilities, it could set a
false sense of security that “…we’re okay...”
• Design penetration tests to exploit potential vulnerabilities, tests
should look for users and/or system administrator/procedural
patterns
• Review the results of penetration testing with the senior
management team
• Develop an action plan to rectify issues that were uncovered and
further bolster the infrastructure resilience.
Cybersecurity Best Practices in Financial Services
Penetration Testing
17
• Develop an ongoing penetration test strategy – mix it up, don’t
necessarily do the same thing over and over again – the bad guys
don’t!
• Penetration test cycles should be run as long as it takes to break in
(i.e., minutes or hours)
• Tests to access applications and systems could run for days or
weeks
• Do not widely publicize that penetration testing is being conducted
to internal staff (i.e., done on a need to know basis)
• Longer duration tests should be done “off cycle” to look to exploit
key controls, client-facing applications and web-based applications.
Cybersecurity Best Practices in Financial Services
Penetration Testing (Cont’d) …
18
• Design vulnerability testing to address and potentially exploit key
controls
• Identify both known (software patches) and unknown (zero day
exploits) vulnerabilities, as well as advanced, persistent threats
• Automate vulnerability testing and scanning; by comparison,
penetration testing is relatively more manual
• Identify the top 5-10 common vulnerability exploits (CVEs) (e.g.,
Microsoft patch day)
• Uncover data changes over both long and short time periods –
subtle changes in data are difficult to detect
• Identify the “kill chain” of events that are associated with an intrusion
• Monitor network controls, patch management, privilege escalation,
containment and risk management processes; they have the biggest
potential for loopholes.
Cybersecurity Best Practices in Financial Services
Vulnerability Testing
19
• Conduct a thorough and ongoing review and inventory of all IT
assets
• Conduct ongoing screening of all systems and infrastructure for
potential vulnerabilities and threats
• Virtualize desktops, restrict/eliminate use of external media on
workstations
• Minimize workstation-to-workstation communications
• Enforce network segmentation, use DMZ controls with limitations on
privileges and access rights
• Deploy change management controls for SW/HW/NWs, operational
control structures, admin access rights
Cybersecurity Best Practices in Financial Services
Best Practice Areas
20
• Standardize and automate software patch management
• Flat network structures are more vulnerable to threats than tiered
networks
• Conduct vulnerability testing based on key controls
• Conduct iterative and progressive test initiatives
• Cooperate and share information with other firms when a cyber
incident occurs
• Develop an ongoing staff training program on cybersecurity
awareness and preparedness
• Design and conduct table top “war room” scenario planning
exercises with the management teams.
Cybersecurity Best Practices in Financial Services
Best Practice Areas (Cont’d) …
21
• The pace of cyber attacks is on the rise, and the bad actors have
become better organized, devious and smarter
• Firms need to be vigilant and proactive in their cybersecurity
preparedness, strategies and tactics
• People will continue to be the weakest links in the chain
• Keep best practices and information security standards relevant, as
long as information security controls can evolve with the changing
nature of cybersecurity threats, vulnerabilities and threats
• There is no “one size fits all” with regards to best practices.
Cybersecurity Best Practices in Financial Services
Conclusions
22
Tellefsen and Company, L.LC.
1-212 809 3800
JJR@Tellefsen.com
Cybersecurity Best Practices in Financial Services
Cybersecurity and Business
Resilience Advisory Services
23

More Related Content

What's hot

Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
Marneil Sanchez
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
Jason Clark
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye, Inc.
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
Joel Aleburu
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&A
Matt Tortora
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
Piyush Jain
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
Hamed Moghaddam
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
SurfWatch Labs
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
William McBorrough
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
Thomas Christopher Ty
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
AdilsonSuende
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
Resilient Systems
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
APNIC
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
Resilient Systems
 

What's hot (20)

Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&A
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 

Viewers also liked

How to scale mobile application security testing
How to scale mobile application security testingHow to scale mobile application security testing
How to scale mobile application security testing
NowSecure
 
Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009ClubHack
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
owaspindia
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
Prateek Jain
 
Basic Guide For Mobile Application Testing
Basic Guide For Mobile Application TestingBasic Guide For Mobile Application Testing
Basic Guide For Mobile Application Testing
Sourabh Kasliwal
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile ApplicationsDenim Group
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
Ankit Giri
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Idexcel Technologies
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
cclark_isec
 
Mobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android AppMobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android App
Abhilash Venkata
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
 

Viewers also liked (13)

How to scale mobile application security testing
How to scale mobile application security testingHow to scale mobile application security testing
How to scale mobile application security testing
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Basic Guide For Mobile Application Testing
Basic Guide For Mobile Application TestingBasic Guide For Mobile Application Testing
Basic Guide For Mobile Application Testing
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android AppMobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android App
 
Security testing
Security testingSecurity testing
Security testing
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
 

Similar to Cybersecurity Best Practices in Financial Services

Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Intergen
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
infosec train
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
CBIZ, Inc.
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
Donald Tabone
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
CBIZ, Inc.
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Empired
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
North Texas Chapter of the ISSA
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
AkramAlqadasi1
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
George Goodall
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
SurfWatch Labs
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
EyesOpen Association
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
Accounting_Whitepapers
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
basilmph
 

Similar to Cybersecurity Best Practices in Financial Services (20)

Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 

More from John Rapa

SEC Regulation SCI: Automation Review Compliance
SEC Regulation SCI:  Automation Review ComplianceSEC Regulation SCI:  Automation Review Compliance
SEC Regulation SCI: Automation Review Compliance
John Rapa
 
Evolution of U.S. Financial Markets 2000-2014
Evolution of U.S. Financial Markets  2000-2014 Evolution of U.S. Financial Markets  2000-2014
Evolution of U.S. Financial Markets 2000-2014
John Rapa
 
Volcker rule update 1210
Volcker rule update 1210Volcker rule update 1210
Volcker rule update 1210
John Rapa
 
Swap Execution Facilities: Market Evolution and SEF Profiles
Swap Execution Facilities: Market Evolution and SEF ProfilesSwap Execution Facilities: Market Evolution and SEF Profiles
Swap Execution Facilities: Market Evolution and SEF Profiles
John Rapa
 
SEC Regulation SCI and Automation Review Policy Compliance
SEC Regulation SCI and Automation Review Policy ComplianceSEC Regulation SCI and Automation Review Policy Compliance
SEC Regulation SCI and Automation Review Policy Compliance
John Rapa
 
SEC Regulation SCI, ARP Reviews and Audits
SEC Regulation SCI, ARP Reviews and AuditsSEC Regulation SCI, ARP Reviews and Audits
SEC Regulation SCI, ARP Reviews and Audits
John Rapa
 
Industry impact and lessons learned from hurricane sandy summary report 010913
Industry impact and lessons learned from hurricane sandy   summary report 010913Industry impact and lessons learned from hurricane sandy   summary report 010913
Industry impact and lessons learned from hurricane sandy summary report 010913
John Rapa
 
Tech Solutions For C 1104
Tech  Solutions For  C 1104Tech  Solutions For  C 1104
Tech Solutions For C 1104
John Rapa
 
O Tlearing 13 Cpril 2010 0.1
O  Tlearing 13  Cpril 2010 0.1O  Tlearing 13  Cpril 2010 0.1
O Tlearing 13 Cpril 2010 0.1
John Rapa
 

More from John Rapa (9)

SEC Regulation SCI: Automation Review Compliance
SEC Regulation SCI:  Automation Review ComplianceSEC Regulation SCI:  Automation Review Compliance
SEC Regulation SCI: Automation Review Compliance
 
Evolution of U.S. Financial Markets 2000-2014
Evolution of U.S. Financial Markets  2000-2014 Evolution of U.S. Financial Markets  2000-2014
Evolution of U.S. Financial Markets 2000-2014
 
Volcker rule update 1210
Volcker rule update 1210Volcker rule update 1210
Volcker rule update 1210
 
Swap Execution Facilities: Market Evolution and SEF Profiles
Swap Execution Facilities: Market Evolution and SEF ProfilesSwap Execution Facilities: Market Evolution and SEF Profiles
Swap Execution Facilities: Market Evolution and SEF Profiles
 
SEC Regulation SCI and Automation Review Policy Compliance
SEC Regulation SCI and Automation Review Policy ComplianceSEC Regulation SCI and Automation Review Policy Compliance
SEC Regulation SCI and Automation Review Policy Compliance
 
SEC Regulation SCI, ARP Reviews and Audits
SEC Regulation SCI, ARP Reviews and AuditsSEC Regulation SCI, ARP Reviews and Audits
SEC Regulation SCI, ARP Reviews and Audits
 
Industry impact and lessons learned from hurricane sandy summary report 010913
Industry impact and lessons learned from hurricane sandy   summary report 010913Industry impact and lessons learned from hurricane sandy   summary report 010913
Industry impact and lessons learned from hurricane sandy summary report 010913
 
Tech Solutions For C 1104
Tech  Solutions For  C 1104Tech  Solutions For  C 1104
Tech Solutions For C 1104
 
O Tlearing 13 Cpril 2010 0.1
O  Tlearing 13  Cpril 2010 0.1O  Tlearing 13  Cpril 2010 0.1
O Tlearing 13 Cpril 2010 0.1
 

Recently uploaded

The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
ydubwyt
 
what is the future of Pi Network currency.
what is the future of Pi Network currency.what is the future of Pi Network currency.
what is the future of Pi Network currency.
DOT TECH
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
lamluanvan.net Viết thuê luận văn
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
DOT TECH
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
DOT TECH
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Henry Tapper
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
DOT TECH
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
DOT TECH
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
DOT TECH
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
telilaalilemlem
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
GunjanSharma28848
 
How to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docxHow to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docx
Buy bitget
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
FinTech Belgium
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
VishnuVenugopal84
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 

Recently uploaded (20)

The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
 
what is the future of Pi Network currency.
what is the future of Pi Network currency.what is the future of Pi Network currency.
what is the future of Pi Network currency.
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
 
How to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docxHow to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docx
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 

Cybersecurity Best Practices in Financial Services

  • 2. • Cybersecurity is of increasing importance to organizations in the financial services industry • It is not clear how aware the C suite is of their enterprise’s cyber security programs, awareness of their strategy and tactics • Cyber attacks pose a great threat to organizations, many of which may not even know they have been victimized • These incursions can disrupt business, steal and/or destroy data • While many firms view cybersecurity as a technology and compliance issue; in reality it should be viewed as a core business risk • It is essential that firms are proactive in their strategies to prevent cyber attacks. • This document will describe the current state of best practices for cybersecurity within global financial services firms. Cybersecurity Best Practices in Financial Services Introduction 2
  • 3. • The highest cybersecurity concerns surround network intrusions, security breaches, the potential for theft, data corruption and reputational damage • Cyber attacks can encompass financial, technical, reputational and/or regulatory threats • There is a fine line between enforcing tight information security controls and providing robust business value • People are the weakest link in the cybersecurity chain; there is a need for ongoing cybersecurity awareness and preparedness training • Firms should identify and segment the more significant key controls, based on threat assessments (e.g., DDoS attacks, theft of data, data corruption). Cybersecurity Best Practices in Financial Services Background 3
  • 4. • Have a robust and ongoing cybersecurity test regime • Cyber testing should be designed around potential and currently unforeseen cyber incident scenarios • Conduct penetration testing of enterprise systems and client-facing systems, with penetration from both an external basis and an internal basis • Testing frameworks should be based on access to threat intelligence and staff involvement in scope and testing. Cybersecurity Best Practices in Financial Services Background (Cont’d) … 4
  • 5. • The persistent threat of cyber attacks makes managing risk a greater focus than before • To properly manage risk, firms must be proactive in their efforts to prepare for potential attack scenarios by not only being ready for them, but by actively searching for potential breaches and successfully removing them. Cybersecurity Best Practices in Financial Services Proactive Cybersecurity Risk Management 5
  • 6. • Establish policies and procedures ahead of time, so you are not improvising, should an attack occur • Gather intelligence so you can identify high impact alerts and prioritize what to tackle first • Position equipment to analyze firewalls and logs to search for anomalies • Identify your major concerns, based on the security “CIA” triumvirate: – Confidentiality – Availability – Integrity • Build these factors into your policy for protecting core systems • Periodically conduct proactive scans • Engage trusted experts to evaluate networks and systems. Cybersecurity Best Practices in Financial Services Cybersecurity Preparedness 6
  • 7. 1. Keep up with software patches – it doesn’t take long for hackers to figure out what the hole is that the patch seeks to cover, and they immediately develop tools to exploit it 2. Keep your online doors closed – many businesses do not know how many computers they have, and sometimes they do not know which are online. Computers that end up online when they shouldn’t be are tempting targets for hackers; the Verizon Data Breach Investigation Report in 2015 indicated that about 25% of breaches were as a result of hackers getting in through a machine that didn’t need to be online. Cybersecurity Best Practices in Financial Services Key Cybersecurity Preparedness Areas 7
  • 8. • People that add machines to the corporate network often do not understand the security concerns. Many devices have default passwords that can be found online. • In other cases, companies have misconfigured anti-hacker technologies to not watch traffic going in and out of such devices. • The solution is to ensure that only necessary machines are online and that they are protected. 3. Encrypt your data – if data is encrypted, there is not a lot that hackers can do with it. You have to rely on technology rather than people 4. Eliminate passwords – users hate them, security staff dread them and hackers love them. Over 25% of breaches analyzed by Verizon this year could have been stopped if the victimized company required more than a password to enter its network. Cybersecurity Best Practices in Financial Services Key Cybersecurity Preparedness Areas (Cont’d) … 8
  • 9. • Passwords are easy and can be used with any computer. Use of tokens or biometric devices provides an added layer of protection. 5. Check out your vendors – smaller vendors and suppliers that have access to corporate networks may not treat cybersecurity with the same severity and urgency. Carful oversight ad vendor due diligence is needed. Cybersecurity Best Practices in Financial Services Key Cybersecurity Preparedness Areas (Cont’d) … 9
  • 10. 1. Make the threat more personal 2. Make the protection more relevant and easy to understand 3. Reduce the number of steps 4. Provide an effective solution 5. Overcome cognitive barriers Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation with Staff 10 Source: Wall Street Journal Report on Information Security, April 20, 2015
  • 11. 1. Make the Threat More Personal – Ask people questions that make the threat hit home (e.g., do you want to know when someone is spying on you?) – People are more likely to pay attention if they are prompted to consider the possibility that their favorite retail outlet is the next target Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 11
  • 12. 2. Make the Protection More Relevant and Easy to Understand: – It is more difficult to deny threats when you can see yourself being attacked or find out that you cannot depend on safety in numbers Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 12
  • 13. 3. Reduce the Number of Steps: – The less we do to gain security, the more likely we are to do it – Systems could be designed so that computers do not have to be plugged in to receive software downloads. – Companies can reduce the need for users to act by making antivirus software the default. Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 13
  • 14. 4. Provide an Effective Solution: – When a practical solution is offered, we are more likely to change our behavior – E.g., the use of biometric readers - digital fingerprints are easy and foolproof – fingerprints is hard to copy and never change. Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 14
  • 15. 5. Overcome Cognitive Barriers: – The biggest barrier to cybersecurity guidelines is remembering a random sequence of letters, numbers and symbols – If a new password is difficult to remember, train staff to create complex passwords they can remember, even if they are not linked to personal information (e.g., iLove2Sleep247!) – Pick something that makes you happy, because bundling something positive with something negative is the best way to make the negative thing less negative. Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 15
  • 16. • Firms should develop a comprehensive testing strategy • Testing should encompass both penetration testing and vulnerability testing • Conduct cybersecurity scenarios with the management team, via table top “war room” exercises; they are relatively easy and cost- effective to plan • Think deviously when designing and planning scenario exercises! • Penetration testing should be conducted no less than annually, depending on the enterprise and the prevailing threat environment • Vulnerability should be based on key controls • Key control risks should be identified in impact analysis reviews with the business units Cybersecurity Best Practices in Financial Services Cybersecurity Testing and Preparedness 16
  • 17. • The goal of penetration testing is to FIND vulnerabilities and FAIL. • If testing illustrates that there are NO vulnerabilities, it could set a false sense of security that “…we’re okay...” • Design penetration tests to exploit potential vulnerabilities, tests should look for users and/or system administrator/procedural patterns • Review the results of penetration testing with the senior management team • Develop an action plan to rectify issues that were uncovered and further bolster the infrastructure resilience. Cybersecurity Best Practices in Financial Services Penetration Testing 17
  • 18. • Develop an ongoing penetration test strategy – mix it up, don’t necessarily do the same thing over and over again – the bad guys don’t! • Penetration test cycles should be run as long as it takes to break in (i.e., minutes or hours) • Tests to access applications and systems could run for days or weeks • Do not widely publicize that penetration testing is being conducted to internal staff (i.e., done on a need to know basis) • Longer duration tests should be done “off cycle” to look to exploit key controls, client-facing applications and web-based applications. Cybersecurity Best Practices in Financial Services Penetration Testing (Cont’d) … 18
  • 19. • Design vulnerability testing to address and potentially exploit key controls • Identify both known (software patches) and unknown (zero day exploits) vulnerabilities, as well as advanced, persistent threats • Automate vulnerability testing and scanning; by comparison, penetration testing is relatively more manual • Identify the top 5-10 common vulnerability exploits (CVEs) (e.g., Microsoft patch day) • Uncover data changes over both long and short time periods – subtle changes in data are difficult to detect • Identify the “kill chain” of events that are associated with an intrusion • Monitor network controls, patch management, privilege escalation, containment and risk management processes; they have the biggest potential for loopholes. Cybersecurity Best Practices in Financial Services Vulnerability Testing 19
  • 20. • Conduct a thorough and ongoing review and inventory of all IT assets • Conduct ongoing screening of all systems and infrastructure for potential vulnerabilities and threats • Virtualize desktops, restrict/eliminate use of external media on workstations • Minimize workstation-to-workstation communications • Enforce network segmentation, use DMZ controls with limitations on privileges and access rights • Deploy change management controls for SW/HW/NWs, operational control structures, admin access rights Cybersecurity Best Practices in Financial Services Best Practice Areas 20
  • 21. • Standardize and automate software patch management • Flat network structures are more vulnerable to threats than tiered networks • Conduct vulnerability testing based on key controls • Conduct iterative and progressive test initiatives • Cooperate and share information with other firms when a cyber incident occurs • Develop an ongoing staff training program on cybersecurity awareness and preparedness • Design and conduct table top “war room” scenario planning exercises with the management teams. Cybersecurity Best Practices in Financial Services Best Practice Areas (Cont’d) … 21
  • 22. • The pace of cyber attacks is on the rise, and the bad actors have become better organized, devious and smarter • Firms need to be vigilant and proactive in their cybersecurity preparedness, strategies and tactics • People will continue to be the weakest links in the chain • Keep best practices and information security standards relevant, as long as information security controls can evolve with the changing nature of cybersecurity threats, vulnerabilities and threats • There is no “one size fits all” with regards to best practices. Cybersecurity Best Practices in Financial Services Conclusions 22
  • 23. Tellefsen and Company, L.LC. 1-212 809 3800 JJR@Tellefsen.com Cybersecurity Best Practices in Financial Services Cybersecurity and Business Resilience Advisory Services 23

Editor's Notes

  1. 1