SlideShare a Scribd company logo
How to Approach the NYDFS
Proposed Cybersecurity
Requirements
About the Presenters
Douglas Kelly
Lead Legal Writer
EverFi
Brian Ralston
Compliance Training Executive
EverFi
Purpose of Webinar
● Explain key legal requirements of the Regulation and
how it interacts with other data security laws.
● Trends, industry best practices, and the value of online
compliance training.
Why We Care About The Regulation
Out of 78 surveyed in-house counsel and compliance
professionals:
● 73% said cybersecurity was their biggest compliance
risk.
● 72% said data breaches were their second biggest
compliance risk.
DLA Piper. (Apr. 2016). Compliance & Risk Report: CCOs Under Scrutiny. Retrieved from
https://www.dlapiper.com/~/media/Files/Insights/Publications/2016/04/DLA_Piper_Complia
nce_Risk_Survey_Report2016.pdf.
Why We Care About The Regulation
The DFS reports:
● 79% of surveyed depository institutions were increasing
their cybersecurity budgets for 2014 - 2017.
● Top three factors driving cybersecurity spending:
1. Compliance and regulatory requirements
2. Business continuity and disaster recovery
3. Reputation
New York State Department of Financial Services. (May 2014). Report on Cyber Security
in the Banking Sector. Retrieved from
http://www.dfs.ny.gov/reportpub/dfs_cyber_banking_report_052014.pdf.
Why We Care About The Regulation
● Data Breaches
○ “Most institutions irrespective of size experienced intrusions or attempted intrusions
into their IT systems over the past three years.” DFS.
● FinTech
○ “As technology dependence in the financial sector continues to grow, so do
opportunities for high-impact technology failures and cyber-attacks.” Federal Rese
Board.
● Reputation
Agenda
● Regulation Key Requirements
● Industry Best Practices and Trends
● Value of Employee Conduct Training
THE REGULATION
Key Facts and Dates
● New York State Department of Financial Services (DFS)
● Who’s Covered
○ Anyone authorized to operate under New York banking, insurance, or
financial services laws. Unclear.
● Effective?
○ January 1, 2017.
○ BUT have until June 30, 2017 to comply.
23 NYCRR 500.20, 21
Case Study
● OCC Security Breach - October 2016
○ Employee downloaded confidential OCC data onto a thumb drive, retired.
○ Download happened 11/2015, not discovered until 9/2016 during audit (performed
every two years).
○ No policy forbidding access at time of download.
○ Data was encrypted, no confidential information misused or leaked.
○ OCC immediately contacted appropriate personnel, then Congress.
NONPUBLIC INFORMATION
Nonpublic Information - General
1. Electronic, “business related information” that would cause a
“material adverse impact to the business, operations or security”
if released.
OCC Case Study
23 NYCRR 500.01(g)(1), (j)
Nonpublic Information - Financial
2. Any information that an individual provides in
connection with any financial product or service.
→ Gramm-Leach-Bliley Act - Privacy Rule
23 NYCRR 500.01(g)(2)
“nonpublic personal information”
{ }
Nonpublic Information - Health
3. Health information. “Any information... that relates to the... physical, mental or
behavioral health or condition of any individual... [and] payment for... health care.”
→ Health Insurance Portability Protection Act (HIPAA) - Privacy Rule
23 NYCRR 500.01(g)(3)
“Individually identifiable health information”
{ }
Nonpublic Information - Catch-all
4. “Any information that can be used to distinguish or trace an individual’s identity”
or “linkable to an individual”
→ EU General Data Privacy Regulation (GDPR) FAQ
23 NYCRR 500.01(g)(4)
“Any information related to a natural person
. . . that can be used to directly or indirectly
identify the person.”{ }
Takeaway #1
Only Nonpublic Information
CYBERSECURITY PROGRAM
Background - NIST and FFIEC
National Institute of Standards and Technology’s (NIST)
Framework Core
● Keep a lookout for Events and Presentations, News
○ Ex. Nov. 2016 - IoT Guidance
Federal Financial Institutions Examination Council (FFIEC)
Cybersecurity Assessment Tool
● FFIEC Information Technology Examination Handbook, NIST
23 NYCRR 500.02
The Law - Cybersecurity Program
Your cybersecurity program must now include:
1. Identify Cyber Risks
2. Protect Nonpublic Information
3. Detect Cybersecurity Events
4. Respond to Cybersecurity Events
5. Recover from Cybersecurity Events
6. Fulfill all regulatory reporting obligations
23 NYCRR 500.02
Pending Regulations, Bills
Two pending laws reflect the same “risk-based” approach:
● Data Security Act of 2015 (A06866)
○ Requires “reasonable safeguards”
○ Incorporates GLB Act, HIPAA, NIST, and international laws.
● Enhanced Cyber Risk Management Standards
○ Interagency proposed rule
○ Incorporates NIST, FFIEC, GLB Act
International Laws
Big international laws require similar security measures:
● EU Data Privacy Shield
○ “reasonable and appropriate measures to protect [data] from loss,
misuse and unauthorized access. . . taking into due account the risks.”
● GDPR
○ “implement appropriate technical and organizational measures” taking
into account “the state of the art and the costs of implementation . . . as
well as the risk of varying likelihood and severity.”
Takeaway #2
Risk Management
CYBERSECURITY POLICIES
Cybersecurity Policies - Four Requirements
● Cybersecurity Policy
○ 14 subjects, including “systems and network monitoring” “vendor
and third-party service provider management” “risk assessment”
● Incident Response Plan
● Third Party Information Security Policy
● Security for In-House Developed Applications
OCC Case Study
23 NYCRR 500.03, 500.11, 500.16, 500.08
Cybersecurity Policies - Third Parties
Two main requirements when doing business with third parties:
● Written policy re: security that third parties must use IF handling nonpublic information.
○ “periodic assessment, at least annually, of such third parties and the continued adequacy of
their cybersecurity practices.”
● Put specific warranties in third party contracts.
○ Ex. “Multi-Factor Authentication” “encryption”
23 NYCRR 500.11
Cybersecurity Policies - Third Parties
Two things to consider:
● Third party ability to comply with data security requirements.
● International Laws
○ GDPR
■ “contracts with processors [must] comply with the GDPR”
○ EU Data Privacy Shield
■ contracts with third party “controllers”
Cybersecurity Policies - FTC
Failure to comply with your own cybersecurity policies is an “unfair practice”
under the FTC Act
● LabMD, Inc., Credit Karma, Fandango
“In this case, LabMD had policies in place that might have avoided the breach, but the policies
weren’t followed. In addition, all employees should have a basic knowledge of data security and
privacy [which, they did not].”
Day, Christine. (2016, Aug. 7). Failure to Protect Data is an Unfair Practice. LawRoom Blog. Retrieved from
http://blog.lawroom.com/data-security/failure-to-protect-data-is-an-unfair-practice/?_sft_category=data-security.
Cybersecurity Policies - Culture
A culture of compliance ensures employees actually follow your policy:
● Tone at the Top
● Legitimacy
○ i.e. codes and policies being enforced visibly and fairly.
● Management
○ i.e. taking policies seriously and following them.
Kelly, Douglas. (Sept. 2016) Compliance Culture: What It Is, and How To Build It. Retrieved from
https://www.youtube.com/watch?v=AIiSJp8jIWc&feature=youtu.be.
Cybersecurity Policies - Action Plan
Compare all data security policies:
● Privacy notices to customers
○ Ex. “nonpublic personal information”*
● Existing internal data security policies
● Third party contracts and policies
● Online privacy statement
*16 C.F.R. § 313.6(a)(1)
Takeaway #3
If You Write It, Do It
Other Requirements
Security Requirements
Required security protocols:
● Penetration Testing and Vulnerability Assessment. 500.05
○ annually, quarterly
● Audit Trail. 500.06
● Access Restrictions. 500.07
● Risk Assessments. 500.09
● Application Security. 500.08
● Multi-Factor Authentication. 500.12
● Data Disposal. 500.13
● Encryption. 500.15
OCC Case Study
Staffing Requirements
Two main changes:
● Chief Information Security Officer (CISO) to oversee program
● Adequate personnel to maintain cybersecurity program
OCC Case Study
23 NYCRR 500.04, 500.10
Reporting Requirements
New reporting requirements:
● CISO report to Board of Directors (2x a year)
● CISO and Board certify compliance to DFS (1x a year)
● CISO report to DFS if there’s a breach
Old reporting requirements:
● NYS Information Security Breach and Notification Act
OCC Case Study
23 NYCRR 500.04
Training Requirements
Monitor activity of Authorized Users
● Mitigate risks, implement controls
Train all employees
● “require all personnel to attend regular cybersecurity awareness
training sessions . . . updated to reflect risks identified by the . . .
annual assessment of risks.”
23 NYCRR 500.15
Takeaway #4
It Takes a Village
Training
Employees Are Critical Assets
“Although external threats tend to grab headlines, insider breaches from employees, consultants, and
others can do just as much—if not more—harm to an institution.” DFS.
“Establishing an information security culture that promotes an effective information security program and
the role of all employees in protecting the institution's information and systems.” FFIEC IT Examination
Handbook.
“76% of IT respondents (up from 67% in a 2014 study) said that their organization had experienced the
loss or theft of company data in the last two years. Insider negligence was more than twice as likely as
external attackers to compromise insider accounts.” Ponemon Institute.
Data Security Threats
● Phishing
○ “In one instance, Verizon analyzed millions of phishing scams and found that 30% of phishing
messages were opened by employees.”
● Shadow IT
○ “80 percent of employees use unsanctioned web applications for work.”
● Password Reuse
○ “63% of confirmed data breaches exploited stolen, weak, or default passwords.”
Recap
The DFS requires the following of your cybersecurity program:
● Identification of cyber risks.
● Implementation of policies and procedures to protect unauthorized access/use or other malicious
acts.
● Detection of cybersecurity events.
● Responsiveness to identified cybersecurity events to mitigate any negative events.
● Recovery from cybersecurity events and restoration of normal operations and services.
Our Training - Checkpoint
The DFS requires the following of your cybersecurity program:
● Identification of cyber risks.
● Implementation of policies and procedures to protect unauthorized access/use or other malicious
acts.
● Detection of cybersecurity events.
● Responsiveness to identified cybersecurity events to mitigate any negative events.
● Recovery from cybersecurity events and restoration of normal operations and services.
About LawRoom
● 20 years in business
● 10 attorneys on staff to help ensure ongoing course compliance and
proactive updates
● 20 instructional designers
● 6 mm employees and students will train with us in 2016
● 3300 corporations and universities rely on us today for compliance training
● Raised 61 million in funding (Amazon founder - Jeff Bezos, Twitter
co-founder - Evan Williams, Google EC - Eric Schmidt)
LawRoom Blog:
blog.lawroom.com
Compliance Tips
Thought-Leadership
Free to Join
Four Posts a Week
Request a Demo
If you would like to learn more about how LawRoom (powered by EverFi) can help you
meet these requirements, please contact us or type “DEMO” in the comments section.
Brian Ralston: bralston@everfi.com
Arjun Sharma: asharma@everfi.com

More Related Content

What's hot

Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
Dawn Yankeelov
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
Colleen Beck-Domanico
 
IASA ey deck presentation
IASA ey deck presentationIASA ey deck presentation
IASA ey deck presentation
Kenneth Dorado, CISA, HCISPP
 
Data breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundationData breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundation
Bradley Arant Boult Cummings LLP
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
Kroll
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
Government Technology and Services Coalition
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
nsheel
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
IT Strategy Group
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
lgcdcpas
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Government Technology and Services Coalition
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
Next Dimension Inc.
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
lgcdcpas
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
CBIZ, Inc.
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Shawn Tuma
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in Depth
PECB
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
Ernest Staats
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 

What's hot (20)

Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
IASA ey deck presentation
IASA ey deck presentationIASA ey deck presentation
IASA ey deck presentation
 
Data breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundationData breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundation
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
 
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in Depth
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 

Viewers also liked

4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
SafeNet
 
Ensuring Security and Compliance in a Data Deluge
Ensuring Security and Compliance in a Data DelugeEnsuring Security and Compliance in a Data Deluge
Ensuring Security and Compliance in a Data Deluge
Tripwire
 
myCVmaged
myCVmagedmyCVmaged
myCVmaged
Maged Oteify
 
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Steven Reback
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
ukdpe
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Shawn Tuma
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with Cloudera
Caserta
 
10 Keys to Data-Centric Security
10 Keys to Data-Centric Security10 Keys to Data-Centric Security
10 Keys to Data-Centric Security
Sirius
 
Seven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption StrategySeven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption Strategy
Sirius
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Ulf Mattsson
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (13)

4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Ensuring Security and Compliance in a Data Deluge
Ensuring Security and Compliance in a Data DelugeEnsuring Security and Compliance in a Data Deluge
Ensuring Security and Compliance in a Data Deluge
 
myCVmaged
myCVmagedmyCVmaged
myCVmaged
 
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with Cloudera
 
10 Keys to Data-Centric Security
10 Keys to Data-Centric Security10 Keys to Data-Centric Security
10 Keys to Data-Centric Security
 
Seven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption StrategySeven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption Strategy
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to How to Approach the NYDFS Proposed Cybersecurity Requirements

Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
Synopsys Software Integrity Group
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
Ulf Mattsson
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
PECB
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
AdilsonSuende
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
Skoda Minotti
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
Raymond Cunningham
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
mihinpr
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
IT Governance Ltd
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
Precisely
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
Precisely
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
soulscout02
 
EVERFI Webinar: Training Under the New York Cybersecurity Requirements
EVERFI Webinar: Training Under the New York Cybersecurity RequirementsEVERFI Webinar: Training Under the New York Cybersecurity Requirements
EVERFI Webinar: Training Under the New York Cybersecurity Requirements
Michele Collu
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
MuhammadArif823
 
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ, Inc.
 
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...
IAB Bulgaria
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
LizbethQuinonez813
 

Similar to How to Approach the NYDFS Proposed Cybersecurity Requirements (20)

Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
EVERFI Webinar: Training Under the New York Cybersecurity Requirements
EVERFI Webinar: Training Under the New York Cybersecurity RequirementsEVERFI Webinar: Training Under the New York Cybersecurity Requirements
EVERFI Webinar: Training Under the New York Cybersecurity Requirements
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018
 
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 

More from Kyle Brown

Building an Ethical Culture: Conduct Training Best Practices
Building an Ethical Culture: Conduct Training Best PracticesBuilding an Ethical Culture: Conduct Training Best Practices
Building an Ethical Culture: Conduct Training Best Practices
Kyle Brown
 
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
Kyle Brown
 
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
Kyle Brown
 
Leveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and AccountabilityLeveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and Accountability
Kyle Brown
 
The Process of Programming: Exploring Best Practices for Effective Prevention...
The Process of Programming: Exploring Best Practices for Effective Prevention...The Process of Programming: Exploring Best Practices for Effective Prevention...
The Process of Programming: Exploring Best Practices for Effective Prevention...
Kyle Brown
 
Learning from Penn State: Five Lessons in Compliance
Learning from Penn State: Five Lessons in Compliance Learning from Penn State: Five Lessons in Compliance
Learning from Penn State: Five Lessons in Compliance
Kyle Brown
 

More from Kyle Brown (6)

Building an Ethical Culture: Conduct Training Best Practices
Building an Ethical Culture: Conduct Training Best PracticesBuilding an Ethical Culture: Conduct Training Best Practices
Building an Ethical Culture: Conduct Training Best Practices
 
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
 
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
 
Leveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and AccountabilityLeveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and Accountability
 
The Process of Programming: Exploring Best Practices for Effective Prevention...
The Process of Programming: Exploring Best Practices for Effective Prevention...The Process of Programming: Exploring Best Practices for Effective Prevention...
The Process of Programming: Exploring Best Practices for Effective Prevention...
 
Learning from Penn State: Five Lessons in Compliance
Learning from Penn State: Five Lessons in Compliance Learning from Penn State: Five Lessons in Compliance
Learning from Penn State: Five Lessons in Compliance
 

Recently uploaded

Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 

Recently uploaded (20)

Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 

How to Approach the NYDFS Proposed Cybersecurity Requirements

  • 1. How to Approach the NYDFS Proposed Cybersecurity Requirements
  • 2. About the Presenters Douglas Kelly Lead Legal Writer EverFi Brian Ralston Compliance Training Executive EverFi
  • 3. Purpose of Webinar ● Explain key legal requirements of the Regulation and how it interacts with other data security laws. ● Trends, industry best practices, and the value of online compliance training.
  • 4. Why We Care About The Regulation Out of 78 surveyed in-house counsel and compliance professionals: ● 73% said cybersecurity was their biggest compliance risk. ● 72% said data breaches were their second biggest compliance risk. DLA Piper. (Apr. 2016). Compliance & Risk Report: CCOs Under Scrutiny. Retrieved from https://www.dlapiper.com/~/media/Files/Insights/Publications/2016/04/DLA_Piper_Complia nce_Risk_Survey_Report2016.pdf.
  • 5. Why We Care About The Regulation The DFS reports: ● 79% of surveyed depository institutions were increasing their cybersecurity budgets for 2014 - 2017. ● Top three factors driving cybersecurity spending: 1. Compliance and regulatory requirements 2. Business continuity and disaster recovery 3. Reputation New York State Department of Financial Services. (May 2014). Report on Cyber Security in the Banking Sector. Retrieved from http://www.dfs.ny.gov/reportpub/dfs_cyber_banking_report_052014.pdf.
  • 6. Why We Care About The Regulation ● Data Breaches ○ “Most institutions irrespective of size experienced intrusions or attempted intrusions into their IT systems over the past three years.” DFS. ● FinTech ○ “As technology dependence in the financial sector continues to grow, so do opportunities for high-impact technology failures and cyber-attacks.” Federal Rese Board. ● Reputation
  • 7. Agenda ● Regulation Key Requirements ● Industry Best Practices and Trends ● Value of Employee Conduct Training
  • 9. Key Facts and Dates ● New York State Department of Financial Services (DFS) ● Who’s Covered ○ Anyone authorized to operate under New York banking, insurance, or financial services laws. Unclear. ● Effective? ○ January 1, 2017. ○ BUT have until June 30, 2017 to comply. 23 NYCRR 500.20, 21
  • 10. Case Study ● OCC Security Breach - October 2016 ○ Employee downloaded confidential OCC data onto a thumb drive, retired. ○ Download happened 11/2015, not discovered until 9/2016 during audit (performed every two years). ○ No policy forbidding access at time of download. ○ Data was encrypted, no confidential information misused or leaked. ○ OCC immediately contacted appropriate personnel, then Congress.
  • 12. Nonpublic Information - General 1. Electronic, “business related information” that would cause a “material adverse impact to the business, operations or security” if released. OCC Case Study 23 NYCRR 500.01(g)(1), (j)
  • 13. Nonpublic Information - Financial 2. Any information that an individual provides in connection with any financial product or service. → Gramm-Leach-Bliley Act - Privacy Rule 23 NYCRR 500.01(g)(2) “nonpublic personal information” { }
  • 14. Nonpublic Information - Health 3. Health information. “Any information... that relates to the... physical, mental or behavioral health or condition of any individual... [and] payment for... health care.” → Health Insurance Portability Protection Act (HIPAA) - Privacy Rule 23 NYCRR 500.01(g)(3) “Individually identifiable health information” { }
  • 15. Nonpublic Information - Catch-all 4. “Any information that can be used to distinguish or trace an individual’s identity” or “linkable to an individual” → EU General Data Privacy Regulation (GDPR) FAQ 23 NYCRR 500.01(g)(4) “Any information related to a natural person . . . that can be used to directly or indirectly identify the person.”{ }
  • 18. Background - NIST and FFIEC National Institute of Standards and Technology’s (NIST) Framework Core ● Keep a lookout for Events and Presentations, News ○ Ex. Nov. 2016 - IoT Guidance Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool ● FFIEC Information Technology Examination Handbook, NIST 23 NYCRR 500.02
  • 19. The Law - Cybersecurity Program Your cybersecurity program must now include: 1. Identify Cyber Risks 2. Protect Nonpublic Information 3. Detect Cybersecurity Events 4. Respond to Cybersecurity Events 5. Recover from Cybersecurity Events 6. Fulfill all regulatory reporting obligations 23 NYCRR 500.02
  • 20. Pending Regulations, Bills Two pending laws reflect the same “risk-based” approach: ● Data Security Act of 2015 (A06866) ○ Requires “reasonable safeguards” ○ Incorporates GLB Act, HIPAA, NIST, and international laws. ● Enhanced Cyber Risk Management Standards ○ Interagency proposed rule ○ Incorporates NIST, FFIEC, GLB Act
  • 21. International Laws Big international laws require similar security measures: ● EU Data Privacy Shield ○ “reasonable and appropriate measures to protect [data] from loss, misuse and unauthorized access. . . taking into due account the risks.” ● GDPR ○ “implement appropriate technical and organizational measures” taking into account “the state of the art and the costs of implementation . . . as well as the risk of varying likelihood and severity.”
  • 24. Cybersecurity Policies - Four Requirements ● Cybersecurity Policy ○ 14 subjects, including “systems and network monitoring” “vendor and third-party service provider management” “risk assessment” ● Incident Response Plan ● Third Party Information Security Policy ● Security for In-House Developed Applications OCC Case Study 23 NYCRR 500.03, 500.11, 500.16, 500.08
  • 25. Cybersecurity Policies - Third Parties Two main requirements when doing business with third parties: ● Written policy re: security that third parties must use IF handling nonpublic information. ○ “periodic assessment, at least annually, of such third parties and the continued adequacy of their cybersecurity practices.” ● Put specific warranties in third party contracts. ○ Ex. “Multi-Factor Authentication” “encryption” 23 NYCRR 500.11
  • 26. Cybersecurity Policies - Third Parties Two things to consider: ● Third party ability to comply with data security requirements. ● International Laws ○ GDPR ■ “contracts with processors [must] comply with the GDPR” ○ EU Data Privacy Shield ■ contracts with third party “controllers”
  • 27. Cybersecurity Policies - FTC Failure to comply with your own cybersecurity policies is an “unfair practice” under the FTC Act ● LabMD, Inc., Credit Karma, Fandango “In this case, LabMD had policies in place that might have avoided the breach, but the policies weren’t followed. In addition, all employees should have a basic knowledge of data security and privacy [which, they did not].” Day, Christine. (2016, Aug. 7). Failure to Protect Data is an Unfair Practice. LawRoom Blog. Retrieved from http://blog.lawroom.com/data-security/failure-to-protect-data-is-an-unfair-practice/?_sft_category=data-security.
  • 28. Cybersecurity Policies - Culture A culture of compliance ensures employees actually follow your policy: ● Tone at the Top ● Legitimacy ○ i.e. codes and policies being enforced visibly and fairly. ● Management ○ i.e. taking policies seriously and following them. Kelly, Douglas. (Sept. 2016) Compliance Culture: What It Is, and How To Build It. Retrieved from https://www.youtube.com/watch?v=AIiSJp8jIWc&feature=youtu.be.
  • 29. Cybersecurity Policies - Action Plan Compare all data security policies: ● Privacy notices to customers ○ Ex. “nonpublic personal information”* ● Existing internal data security policies ● Third party contracts and policies ● Online privacy statement *16 C.F.R. § 313.6(a)(1)
  • 30. Takeaway #3 If You Write It, Do It
  • 32. Security Requirements Required security protocols: ● Penetration Testing and Vulnerability Assessment. 500.05 ○ annually, quarterly ● Audit Trail. 500.06 ● Access Restrictions. 500.07 ● Risk Assessments. 500.09 ● Application Security. 500.08 ● Multi-Factor Authentication. 500.12 ● Data Disposal. 500.13 ● Encryption. 500.15 OCC Case Study
  • 33. Staffing Requirements Two main changes: ● Chief Information Security Officer (CISO) to oversee program ● Adequate personnel to maintain cybersecurity program OCC Case Study 23 NYCRR 500.04, 500.10
  • 34. Reporting Requirements New reporting requirements: ● CISO report to Board of Directors (2x a year) ● CISO and Board certify compliance to DFS (1x a year) ● CISO report to DFS if there’s a breach Old reporting requirements: ● NYS Information Security Breach and Notification Act OCC Case Study 23 NYCRR 500.04
  • 35. Training Requirements Monitor activity of Authorized Users ● Mitigate risks, implement controls Train all employees ● “require all personnel to attend regular cybersecurity awareness training sessions . . . updated to reflect risks identified by the . . . annual assessment of risks.” 23 NYCRR 500.15
  • 36. Takeaway #4 It Takes a Village
  • 38. Employees Are Critical Assets “Although external threats tend to grab headlines, insider breaches from employees, consultants, and others can do just as much—if not more—harm to an institution.” DFS. “Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems.” FFIEC IT Examination Handbook. “76% of IT respondents (up from 67% in a 2014 study) said that their organization had experienced the loss or theft of company data in the last two years. Insider negligence was more than twice as likely as external attackers to compromise insider accounts.” Ponemon Institute.
  • 39. Data Security Threats ● Phishing ○ “In one instance, Verizon analyzed millions of phishing scams and found that 30% of phishing messages were opened by employees.” ● Shadow IT ○ “80 percent of employees use unsanctioned web applications for work.” ● Password Reuse ○ “63% of confirmed data breaches exploited stolen, weak, or default passwords.”
  • 40. Recap The DFS requires the following of your cybersecurity program: ● Identification of cyber risks. ● Implementation of policies and procedures to protect unauthorized access/use or other malicious acts. ● Detection of cybersecurity events. ● Responsiveness to identified cybersecurity events to mitigate any negative events. ● Recovery from cybersecurity events and restoration of normal operations and services.
  • 41. Our Training - Checkpoint The DFS requires the following of your cybersecurity program: ● Identification of cyber risks. ● Implementation of policies and procedures to protect unauthorized access/use or other malicious acts. ● Detection of cybersecurity events. ● Responsiveness to identified cybersecurity events to mitigate any negative events. ● Recovery from cybersecurity events and restoration of normal operations and services.
  • 42. About LawRoom ● 20 years in business ● 10 attorneys on staff to help ensure ongoing course compliance and proactive updates ● 20 instructional designers ● 6 mm employees and students will train with us in 2016 ● 3300 corporations and universities rely on us today for compliance training ● Raised 61 million in funding (Amazon founder - Jeff Bezos, Twitter co-founder - Evan Williams, Google EC - Eric Schmidt)
  • 44. Request a Demo If you would like to learn more about how LawRoom (powered by EverFi) can help you meet these requirements, please contact us or type “DEMO” in the comments section. Brian Ralston: bralston@everfi.com Arjun Sharma: asharma@everfi.com