SlideShare a Scribd company logo
1
G7 FUNDAMENTAL ELEMENTS OF CYBERSECURITY
FOR THE FINANCIAL SECTOR
Increasing in sophistication, frequency, and persistence, cyber risks are growing more dangerous
and diverse, threatening to disrupt our interconnected global financial systems and the
institutions that operate and support those systems. To address these risks, the below non-
binding, high-level fundamental elements are designed for financial sector private and public
entities to tailor to their specific operational and threat landscape, role in the sector, and legal and
regulatory requirements.
The elements serve as the building blocks upon which an entity can design and implement its
cybersecurity strategy and operating framework, informed by its approach to risk management
and culture. The elements also provide steps in a dynamic process through which the entity can
systematically re-evaluate its cybersecurity strategy and framework as the operational and threat
environment evolves. Public authorities within and across jurisdictions can use the elements as
well to guide their public policy, regulatory, and supervisory efforts. Working together, informed
by these elements, private and public entities and public authorities can help bolster the overall
cybersecurity and resiliency of the international financial system.
Element 1: Cybersecurity Strategy and Framework.
Establish and maintain a cybersecurity strategy and framework tailored to specific cyber risks
and appropriately informed by international, national, and industry standards and guidelines.
The purpose of a cybersecurity strategy and framework is to specify how to identify, manage,
and reduce cyber risks effectively in an integrated and comprehensive manner. Entities in the
financial sector should establish cybersecurity strategies and frameworks tailored to their
nature, size, complexity, risk profile, and culture. Informed by the cyber threat and vulnerability
landscape, a jurisdiction can also establish sector-wide cybersecurity strategies and frameworks
that outline how cooperation occurs between entities and public authorities in the financial
sector, with sectors upon which the financial sector depends, and with other relevant
jurisdictions.
Element 2: Governance.
Define and facilitate performance of roles and responsibilities for personnel implementing,
managing, and overseeing the effectiveness of the cybersecurity strategy and framework to
ensure accountability; and provide adequate resources, appropriate authority, and access to the
governing authority (e.g., board of directors or senior officials at public authorities).
Effective governance structures reinforce accountability by articulating clear responsibilities
and lines of reporting and escalation. Effective governance also mediates competing objectives
and fosters communication among operating units, information technology, risk, and control-
related activities. Consistent with their missions and strategies, boards of directors (or similar
oversight bodies for public entities or authorities) should establish the cyber risk tolerance for
their entities and oversee the design, implementation, and effectiveness of related cybersecurity
programs.
2
Element 3: Risk and Control Assessment.
Identify functions, activities, products, and services—including interconnections, dependencies,
and third parties—prioritize their relative importance, and assess their respective cyber risks.
Identify and implement controls—including systems, policies, procedures, and training—to
protect against and manage those risks within the tolerance set by the governing authority.
Ideally as part of an enterprise risk management program, entities should evaluate the inherent
cyber risk (or the risk absent any compensating controls) presented by the people, processes,
technology, and underlying data that support each identified function, activity, product, and
service. Entities should then identify and assess the existence and effectiveness of controls to
protect against the identified risk to arrive at the residual cyber risk. Protection mechanisms can
include avoiding or eliminating risk by not engaging in an identified activity. They can also
include mitigating the risk through controls or sharing or transferring the risk. In addition to
evaluating an entity’s own cyber risks from its functions, activities, products, and services, risk
and control assessments should consider as appropriate any cyber risks the entity presents to
others and the financial sector as a whole. Public authorities should map critical economic
functions in their financial systems as part of their risk and control assessments to identify single
points of failure and concentration risk. The sector’s critical economic functions range from
deposit taking, lending, and payments to trading, clearing, settlement, and custody.
Element 4: Monitoring.
Establish systematic monitoring processes to rapidly detect cyber incidents and periodically
evaluate the effectiveness of identified controls, including through network monitoring, testing,
audits, and exercises.
Effective monitoring helps entities adhere to established risk tolerances and timely enhance or
remediate weaknesses in existing controls. Testing and auditing protocols provide essential
assurance mechanisms for entities and public authorities alike. Depending on the nature of an
entity and its cyber risk profile and control environment, the testing and auditing functions
should be appropriately independent from the personnel responsible for implementing and
managing the cybersecurity program. Through examinations, on-site and other supervisory
mechanisms, comparative analysis of entities’ testing results, and joint public-private exercises,
public authorities can better understand sector-wide cyber threats and vulnerabilities, as well as
individual entities’ relative risk profiles and capabilities.
Element 5: Response.
Timely (a) assess the nature, scope, and impact of a cyber incident; (b) contain the incident and
mitigate its impact; (c) notify internal and external stakeholders (such as law enforcement,
regulators, and other public authorities, as well as shareholders, third-party service providers, and
customers as appropriate); and (d) coordinate joint response activities as needed.
As part of their risk and control assessments, entities should implement incident response
policies and other controls to facilitate effective incident response. Among other things, these
controls should clearly address decision-making responsibilities, define escalation procedures,
and establish processes for communicating with internal and external stakeholders. Exercising
protocols within and among entities and public authorities contributes to more effective
responses. Exercising also enables entities and public authorities to identify how potential
3
decisions could affect each other’s ability to maintain critical and other functions, services, and
activities.
Element 6: Recovery.
Resume operations responsibly, while allowing for continued remediation, including by (a)
eliminating harmful remnants of the incident; (b) restoring systems and data to normal and
confirming normal state; (c) identifying and mitigating all vulnerabilities that were exploited;
(d) remediating vulnerabilities to prevent similar incidents; and (e) communicating appropriately
internally and externally.
Once operational stability and integrity are assured, prompt and effective recovery of operations
should be based on prioritization of critical economic and other functions and in accordance
with objectives set by the relevant public authorities. Maintaining trust and confidence in the
financial sector significantly improves when entities and public authorities have the ability to
mutually assist each other in the resumption and recovery of critical functions, processes, and
activities. Therefore, before an incident occurs, establishing and testing contingency plans for
essential activities and key processes, such as funding, can contribute to a faster and more
effective recovery.
Element 7: Information Sharing.
Engage in the timely sharing of reliable, actionable cybersecurity information with internal and
external stakeholders (including entities and public authorities within and outside the financial
sector) on threats, vulnerabilities, incidents, and responses to enhance defenses, limit damage,
increase situational awareness, and broaden learning.
Sharing technical information, such as threat indicators or details on how vulnerabilities were
exploited, allows entities to remain up-to-date in their defenses and learn about emerging
methods used by attackers. Sharing broader insights among entities, between entities and public
authorities, and among public authorities deepens collective understanding of how attackers may
exploit sector-wide vulnerabilities that could potentially disrupt critical economic functions and
endanger financial stability. Given its importance, entities and public authorities should identify
and address impediments to information sharing.
Element 8: Continuous Learning.
Review the cybersecurity strategy and framework regularly and when events warrant—including
its governance, risk and control assessment, monitoring, response, recovery, and information
sharing components—to address changes in cyber risks, allocate resources, identify and
remediate gaps, and incorporate lessons learned.
Cyber threats and vulnerabilities evolve rapidly, as do best practices and technical standards to
address them. The composition of the financial sector also changes over time, as new types of
entities, products, and services emerge, and third-party service providers are increasingly relied
upon. Entity-specific, as well as sector-wide, cybersecurity strategies and frameworks need
periodic review and update to adapt to changes in the threat and control environment, enhance
user awareness, and to effectively deploy resources. Other sectors, such as energy and
telecommunications, present external dependencies; therefore, entities and public authorities
should consider developments in these sectors as part of any review process.

More Related Content

What's hot

Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Dean Evans
 
2003-cost-report
2003-cost-report2003-cost-report
IEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciIEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-Massacci
Fabio Massacci
 
DRAFT of NEW White House Cybersecurity Executive Order leaked
DRAFT of NEW White House Cybersecurity Executive Order leakedDRAFT of NEW White House Cybersecurity Executive Order leaked
DRAFT of NEW White House Cybersecurity Executive Order leaked
David Sweigert
 
FERMA Webinar: At the Junction of Corporate Governance and Cyber Security
FERMA Webinar: At the Junction of Corporate Governance and Cyber SecurityFERMA Webinar: At the Junction of Corporate Governance and Cyber Security
FERMA Webinar: At the Junction of Corporate Governance and Cyber Security
FERMA
 
Ir s 1_2_1_kovacs
Ir s 1_2_1_kovacsIr s 1_2_1_kovacs
Ir s 1_2_1_kovacs
Stefan Kovacs
 
DHS look at Cyber Insurance
DHS look at Cyber InsuranceDHS look at Cyber Insurance
DHS look at Cyber Insurance
David Sweigert
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1
Sal Velasco
 
Aggressive Audits are Here to Stay: Radiology Practices Must Proactively Prep...
Aggressive Audits are Here to Stay: Radiology Practices Must Proactively Prep...Aggressive Audits are Here to Stay: Radiology Practices Must Proactively Prep...
Aggressive Audits are Here to Stay: Radiology Practices Must Proactively Prep...
mckessonrms
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
Marc S. Sokol
 
Cda disaster presentation 2010
Cda disaster presentation 2010Cda disaster presentation 2010
Cda disaster presentation 2010
Vernon Turner
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Christopher Nanchengwa
 
Mass transit security awareness white paper
Mass transit security awareness white paperMass transit security awareness white paper
Mass transit security awareness white paper
zcelik
 

What's hot (13)

Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
 
2003-cost-report
2003-cost-report2003-cost-report
2003-cost-report
 
IEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciIEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-Massacci
 
DRAFT of NEW White House Cybersecurity Executive Order leaked
DRAFT of NEW White House Cybersecurity Executive Order leakedDRAFT of NEW White House Cybersecurity Executive Order leaked
DRAFT of NEW White House Cybersecurity Executive Order leaked
 
FERMA Webinar: At the Junction of Corporate Governance and Cyber Security
FERMA Webinar: At the Junction of Corporate Governance and Cyber SecurityFERMA Webinar: At the Junction of Corporate Governance and Cyber Security
FERMA Webinar: At the Junction of Corporate Governance and Cyber Security
 
Ir s 1_2_1_kovacs
Ir s 1_2_1_kovacsIr s 1_2_1_kovacs
Ir s 1_2_1_kovacs
 
DHS look at Cyber Insurance
DHS look at Cyber InsuranceDHS look at Cyber Insurance
DHS look at Cyber Insurance
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1
 
Aggressive Audits are Here to Stay: Radiology Practices Must Proactively Prep...
Aggressive Audits are Here to Stay: Radiology Practices Must Proactively Prep...Aggressive Audits are Here to Stay: Radiology Practices Must Proactively Prep...
Aggressive Audits are Here to Stay: Radiology Practices Must Proactively Prep...
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Cda disaster presentation 2010
Cda disaster presentation 2010Cda disaster presentation 2010
Cda disaster presentation 2010
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Mass transit security awareness white paper
Mass transit security awareness white paperMass transit security awareness white paper
Mass transit security awareness white paper
 

Viewers also liked

Guia de políticas_públicas_gerenciando_processos_o_o0s4bz
Guia de políticas_públicas_gerenciando_processos_o_o0s4bzGuia de políticas_públicas_gerenciando_processos_o_o0s4bz
Guia de políticas_públicas_gerenciando_processos_o_o0s4bz
Angélica Dantas
 
Como puede impactar en america latina donald trump final
Como puede impactar en america latina  donald trump finalComo puede impactar en america latina  donald trump final
Como puede impactar en america latina donald trump final
ingry catalina torres velandia
 
Líneas de transmisión con y sin perdidas
Líneas de transmisión con y sin perdidasLíneas de transmisión con y sin perdidas
Líneas de transmisión con y sin perdidas
Cesar Daniel Salazar Pérez
 
Gloria mercado actividad1_2_mapac
Gloria mercado actividad1_2_mapacGloria mercado actividad1_2_mapac
Gloria mercado actividad1_2_mapac
Gloria Amparo Mercado Martínez
 
Dilluns 20 2-17 1
Dilluns 20 2-17 1Dilluns 20 2-17 1
Dilluns 20 2-17 1
escolagarbi
 
0 pgpro--alcance-gerentes-ventas
0 pgpro--alcance-gerentes-ventas0 pgpro--alcance-gerentes-ventas
0 pgpro--alcance-gerentes-ventas
Walter Galvez
 
ITSC-NEWS LETTER
ITSC-NEWS LETTERITSC-NEWS LETTER
ITSC-NEWS LETTER
adam evarist
 
Presentation
PresentationPresentation
Presentation
AstroJoyce
 
Sin título 1
Sin título 1Sin título 1
Sin título 1
luzmuv
 
goget Cover Letter
goget Cover Lettergoget Cover Letter
goget Cover Letter
Adele Pile
 
Informe invest 2015
Informe invest 2015Informe invest 2015
Informe invest 2015
Lionel Bardales del Aguila
 
Poster 17x20 4/c
Poster 17x20 4/cPoster 17x20 4/c
Poster 17x20 4/c
NancyBond
 
Six Sigma Project
Six Sigma ProjectSix Sigma Project
Six Sigma Project
Abhishek Gharge
 
Question 1 Media Evaluation
Question 1 Media EvaluationQuestion 1 Media Evaluation
Question 1 Media Evaluation
11-ipai
 
3ºESO Diseño Publicitario
3ºESO Diseño Publicitario3ºESO Diseño Publicitario
3ºESO Diseño Publicitario
Marta Pascual
 
Advertising layout ppt
Advertising layout pptAdvertising layout ppt
Advertising layout ppt
SUNNY18572
 

Viewers also liked (16)

Guia de políticas_públicas_gerenciando_processos_o_o0s4bz
Guia de políticas_públicas_gerenciando_processos_o_o0s4bzGuia de políticas_públicas_gerenciando_processos_o_o0s4bz
Guia de políticas_públicas_gerenciando_processos_o_o0s4bz
 
Como puede impactar en america latina donald trump final
Como puede impactar en america latina  donald trump finalComo puede impactar en america latina  donald trump final
Como puede impactar en america latina donald trump final
 
Líneas de transmisión con y sin perdidas
Líneas de transmisión con y sin perdidasLíneas de transmisión con y sin perdidas
Líneas de transmisión con y sin perdidas
 
Gloria mercado actividad1_2_mapac
Gloria mercado actividad1_2_mapacGloria mercado actividad1_2_mapac
Gloria mercado actividad1_2_mapac
 
Dilluns 20 2-17 1
Dilluns 20 2-17 1Dilluns 20 2-17 1
Dilluns 20 2-17 1
 
0 pgpro--alcance-gerentes-ventas
0 pgpro--alcance-gerentes-ventas0 pgpro--alcance-gerentes-ventas
0 pgpro--alcance-gerentes-ventas
 
ITSC-NEWS LETTER
ITSC-NEWS LETTERITSC-NEWS LETTER
ITSC-NEWS LETTER
 
Presentation
PresentationPresentation
Presentation
 
Sin título 1
Sin título 1Sin título 1
Sin título 1
 
goget Cover Letter
goget Cover Lettergoget Cover Letter
goget Cover Letter
 
Informe invest 2015
Informe invest 2015Informe invest 2015
Informe invest 2015
 
Poster 17x20 4/c
Poster 17x20 4/cPoster 17x20 4/c
Poster 17x20 4/c
 
Six Sigma Project
Six Sigma ProjectSix Sigma Project
Six Sigma Project
 
Question 1 Media Evaluation
Question 1 Media EvaluationQuestion 1 Media Evaluation
Question 1 Media Evaluation
 
3ºESO Diseño Publicitario
3ºESO Diseño Publicitario3ºESO Diseño Publicitario
3ºESO Diseño Publicitario
 
Advertising layout ppt
Advertising layout pptAdvertising layout ppt
Advertising layout ppt
 

Similar to G7 fundamental elements_oct_2016

Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
Josef Sulca Cueva
 
· Per the e-Activity, analyze one (1) of the core tenets establish.docx
· Per the e-Activity, analyze one (1) of the core tenets establish.docx· Per the e-Activity, analyze one (1) of the core tenets establish.docx
· Per the e-Activity, analyze one (1) of the core tenets establish.docx
LynellBull52
 
Cyber security reguations: The shape of things to come for captives?
Cyber security reguations: The shape of things to come for captives?Cyber security reguations: The shape of things to come for captives?
Cyber security reguations: The shape of things to come for captives?
Daniel Message
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
DaviesParker
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
Beji Jacob
 
OECD Recommendation on the Governance of Critical Risks
OECD Recommendation on the Governance of Critical RisksOECD Recommendation on the Governance of Critical Risks
OECD Recommendation on the Governance of Critical Risks
OECD Governance
 
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
JASS44
 
Expert Answers
Expert AnswersExpert Answers
Expert Answers
Harish Krishnaswamy
 
Cyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive SummaryCyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive Summary
Steve Leventhal
 
Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016
jennyhollingworth
 
White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014
EMC
 
Event security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.ukEvent security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.uk
Ahsan Gill
 
Identify regulatory issues relevant to potential employers in the fi.pdf
Identify regulatory issues relevant to potential employers in the fi.pdfIdentify regulatory issues relevant to potential employers in the fi.pdf
Identify regulatory issues relevant to potential employers in the fi.pdf
fazalenterprises
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Marc S. Sokol
 
Cyber ANPR Regulatory Alert - October 2016
Cyber ANPR Regulatory Alert - October 2016Cyber ANPR Regulatory Alert - October 2016
Cyber ANPR Regulatory Alert - October 2016
Ben-Ari Boukai
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
Paul Stabile
 
Cybersecurity Risk -- Redefing real risk measurement for the CISO
Cybersecurity Risk  -- Redefing real risk measurement for the CISOCybersecurity Risk  -- Redefing real risk measurement for the CISO
Cybersecurity Risk -- Redefing real risk measurement for the CISO
David Sweigert
 
RISK-ACADEMY’s guide on compliance risk in non-financial companies. Free down...
RISK-ACADEMY’s guide on compliance risk in non-financial companies. Free down...RISK-ACADEMY’s guide on compliance risk in non-financial companies. Free down...
RISK-ACADEMY’s guide on compliance risk in non-financial companies. Free down...
Alexei Sidorenko, CRMP
 
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
felicidaddinwoodie
 
Assembling-Accountability.pdf
Assembling-Accountability.pdfAssembling-Accountability.pdf
Assembling-Accountability.pdf
ssusere0ee1d
 

Similar to G7 fundamental elements_oct_2016 (20)

Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
 
· Per the e-Activity, analyze one (1) of the core tenets establish.docx
· Per the e-Activity, analyze one (1) of the core tenets establish.docx· Per the e-Activity, analyze one (1) of the core tenets establish.docx
· Per the e-Activity, analyze one (1) of the core tenets establish.docx
 
Cyber security reguations: The shape of things to come for captives?
Cyber security reguations: The shape of things to come for captives?Cyber security reguations: The shape of things to come for captives?
Cyber security reguations: The shape of things to come for captives?
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
OECD Recommendation on the Governance of Critical Risks
OECD Recommendation on the Governance of Critical RisksOECD Recommendation on the Governance of Critical Risks
OECD Recommendation on the Governance of Critical Risks
 
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
 
Expert Answers
Expert AnswersExpert Answers
Expert Answers
 
Cyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive SummaryCyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive Summary
 
Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016
 
White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014White paper holistic_approach_to_government_continuity_of_operations_apr2014
White paper holistic_approach_to_government_continuity_of_operations_apr2014
 
Event security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.ukEvent security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.uk
 
Identify regulatory issues relevant to potential employers in the fi.pdf
Identify regulatory issues relevant to potential employers in the fi.pdfIdentify regulatory issues relevant to potential employers in the fi.pdf
Identify regulatory issues relevant to potential employers in the fi.pdf
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...
 
Cyber ANPR Regulatory Alert - October 2016
Cyber ANPR Regulatory Alert - October 2016Cyber ANPR Regulatory Alert - October 2016
Cyber ANPR Regulatory Alert - October 2016
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 
Cybersecurity Risk -- Redefing real risk measurement for the CISO
Cybersecurity Risk  -- Redefing real risk measurement for the CISOCybersecurity Risk  -- Redefing real risk measurement for the CISO
Cybersecurity Risk -- Redefing real risk measurement for the CISO
 
RISK-ACADEMY’s guide on compliance risk in non-financial companies. Free down...
RISK-ACADEMY’s guide on compliance risk in non-financial companies. Free down...RISK-ACADEMY’s guide on compliance risk in non-financial companies. Free down...
RISK-ACADEMY’s guide on compliance risk in non-financial companies. Free down...
 
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
 
Assembling-Accountability.pdf
Assembling-Accountability.pdfAssembling-Accountability.pdf
Assembling-Accountability.pdf
 

Recently uploaded

Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
HajeJanKamps
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
taqyea
 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
dazzjoker
 
Discover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling ServiceDiscover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling Service
obriengroupinc04
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
katiejasper96
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
valvereliz227
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
thesiliconleaders
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Niswey
 
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Herman Kienhuis
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
IPLTech Electric
 
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
concepsionchomo153
 
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
irhcs
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15
advik4387
 
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
Ksquare Energy Pvt. Ltd.
 
Efficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web ApplicationsEfficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web Applications
Harwinder Singh
 

Recently uploaded (20)

Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
 
Discover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling ServiceDiscover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling Service
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
 
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
 
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
 
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15
 
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
 
Efficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web ApplicationsEfficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web Applications
 

G7 fundamental elements_oct_2016

  • 1. 1 G7 FUNDAMENTAL ELEMENTS OF CYBERSECURITY FOR THE FINANCIAL SECTOR Increasing in sophistication, frequency, and persistence, cyber risks are growing more dangerous and diverse, threatening to disrupt our interconnected global financial systems and the institutions that operate and support those systems. To address these risks, the below non- binding, high-level fundamental elements are designed for financial sector private and public entities to tailor to their specific operational and threat landscape, role in the sector, and legal and regulatory requirements. The elements serve as the building blocks upon which an entity can design and implement its cybersecurity strategy and operating framework, informed by its approach to risk management and culture. The elements also provide steps in a dynamic process through which the entity can systematically re-evaluate its cybersecurity strategy and framework as the operational and threat environment evolves. Public authorities within and across jurisdictions can use the elements as well to guide their public policy, regulatory, and supervisory efforts. Working together, informed by these elements, private and public entities and public authorities can help bolster the overall cybersecurity and resiliency of the international financial system. Element 1: Cybersecurity Strategy and Framework. Establish and maintain a cybersecurity strategy and framework tailored to specific cyber risks and appropriately informed by international, national, and industry standards and guidelines. The purpose of a cybersecurity strategy and framework is to specify how to identify, manage, and reduce cyber risks effectively in an integrated and comprehensive manner. Entities in the financial sector should establish cybersecurity strategies and frameworks tailored to their nature, size, complexity, risk profile, and culture. Informed by the cyber threat and vulnerability landscape, a jurisdiction can also establish sector-wide cybersecurity strategies and frameworks that outline how cooperation occurs between entities and public authorities in the financial sector, with sectors upon which the financial sector depends, and with other relevant jurisdictions. Element 2: Governance. Define and facilitate performance of roles and responsibilities for personnel implementing, managing, and overseeing the effectiveness of the cybersecurity strategy and framework to ensure accountability; and provide adequate resources, appropriate authority, and access to the governing authority (e.g., board of directors or senior officials at public authorities). Effective governance structures reinforce accountability by articulating clear responsibilities and lines of reporting and escalation. Effective governance also mediates competing objectives and fosters communication among operating units, information technology, risk, and control- related activities. Consistent with their missions and strategies, boards of directors (or similar oversight bodies for public entities or authorities) should establish the cyber risk tolerance for their entities and oversee the design, implementation, and effectiveness of related cybersecurity programs.
  • 2. 2 Element 3: Risk and Control Assessment. Identify functions, activities, products, and services—including interconnections, dependencies, and third parties—prioritize their relative importance, and assess their respective cyber risks. Identify and implement controls—including systems, policies, procedures, and training—to protect against and manage those risks within the tolerance set by the governing authority. Ideally as part of an enterprise risk management program, entities should evaluate the inherent cyber risk (or the risk absent any compensating controls) presented by the people, processes, technology, and underlying data that support each identified function, activity, product, and service. Entities should then identify and assess the existence and effectiveness of controls to protect against the identified risk to arrive at the residual cyber risk. Protection mechanisms can include avoiding or eliminating risk by not engaging in an identified activity. They can also include mitigating the risk through controls or sharing or transferring the risk. In addition to evaluating an entity’s own cyber risks from its functions, activities, products, and services, risk and control assessments should consider as appropriate any cyber risks the entity presents to others and the financial sector as a whole. Public authorities should map critical economic functions in their financial systems as part of their risk and control assessments to identify single points of failure and concentration risk. The sector’s critical economic functions range from deposit taking, lending, and payments to trading, clearing, settlement, and custody. Element 4: Monitoring. Establish systematic monitoring processes to rapidly detect cyber incidents and periodically evaluate the effectiveness of identified controls, including through network monitoring, testing, audits, and exercises. Effective monitoring helps entities adhere to established risk tolerances and timely enhance or remediate weaknesses in existing controls. Testing and auditing protocols provide essential assurance mechanisms for entities and public authorities alike. Depending on the nature of an entity and its cyber risk profile and control environment, the testing and auditing functions should be appropriately independent from the personnel responsible for implementing and managing the cybersecurity program. Through examinations, on-site and other supervisory mechanisms, comparative analysis of entities’ testing results, and joint public-private exercises, public authorities can better understand sector-wide cyber threats and vulnerabilities, as well as individual entities’ relative risk profiles and capabilities. Element 5: Response. Timely (a) assess the nature, scope, and impact of a cyber incident; (b) contain the incident and mitigate its impact; (c) notify internal and external stakeholders (such as law enforcement, regulators, and other public authorities, as well as shareholders, third-party service providers, and customers as appropriate); and (d) coordinate joint response activities as needed. As part of their risk and control assessments, entities should implement incident response policies and other controls to facilitate effective incident response. Among other things, these controls should clearly address decision-making responsibilities, define escalation procedures, and establish processes for communicating with internal and external stakeholders. Exercising protocols within and among entities and public authorities contributes to more effective responses. Exercising also enables entities and public authorities to identify how potential
  • 3. 3 decisions could affect each other’s ability to maintain critical and other functions, services, and activities. Element 6: Recovery. Resume operations responsibly, while allowing for continued remediation, including by (a) eliminating harmful remnants of the incident; (b) restoring systems and data to normal and confirming normal state; (c) identifying and mitigating all vulnerabilities that were exploited; (d) remediating vulnerabilities to prevent similar incidents; and (e) communicating appropriately internally and externally. Once operational stability and integrity are assured, prompt and effective recovery of operations should be based on prioritization of critical economic and other functions and in accordance with objectives set by the relevant public authorities. Maintaining trust and confidence in the financial sector significantly improves when entities and public authorities have the ability to mutually assist each other in the resumption and recovery of critical functions, processes, and activities. Therefore, before an incident occurs, establishing and testing contingency plans for essential activities and key processes, such as funding, can contribute to a faster and more effective recovery. Element 7: Information Sharing. Engage in the timely sharing of reliable, actionable cybersecurity information with internal and external stakeholders (including entities and public authorities within and outside the financial sector) on threats, vulnerabilities, incidents, and responses to enhance defenses, limit damage, increase situational awareness, and broaden learning. Sharing technical information, such as threat indicators or details on how vulnerabilities were exploited, allows entities to remain up-to-date in their defenses and learn about emerging methods used by attackers. Sharing broader insights among entities, between entities and public authorities, and among public authorities deepens collective understanding of how attackers may exploit sector-wide vulnerabilities that could potentially disrupt critical economic functions and endanger financial stability. Given its importance, entities and public authorities should identify and address impediments to information sharing. Element 8: Continuous Learning. Review the cybersecurity strategy and framework regularly and when events warrant—including its governance, risk and control assessment, monitoring, response, recovery, and information sharing components—to address changes in cyber risks, allocate resources, identify and remediate gaps, and incorporate lessons learned. Cyber threats and vulnerabilities evolve rapidly, as do best practices and technical standards to address them. The composition of the financial sector also changes over time, as new types of entities, products, and services emerge, and third-party service providers are increasingly relied upon. Entity-specific, as well as sector-wide, cybersecurity strategies and frameworks need periodic review and update to adapt to changes in the threat and control environment, enhance user awareness, and to effectively deploy resources. Other sectors, such as energy and telecommunications, present external dependencies; therefore, entities and public authorities should consider developments in these sectors as part of any review process.