ELOC Bank Table Top Exercise Executive Leadership of Cybersecurity Austin, TX December 3, 2014 1.

Slides:



Advertisements
Similar presentations
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
The importance of a Compliance program is to ensure that our agency meets the highest possible standards for all relevant federal, state and local regulations,
Introduction to the Investigative Audit Services Group.
Company and Product Overview The AMLA Doug Keipper, CAMS.
Internal Audit Review For Small Projects Cyndi Fout Project Services Director October 26, 2009.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Management Control Systems
Accepting Credit Cards on your Website. If you are building an online shop, you will need to address the question of taking payments for orders. You can,
Department Of Computer Engineering
Network security policy: best practices
E XAMINATION AND E NFORCEMENT I SSUES : B EYOND T HE P ILLARS The AMLA Third Annual Full Day BSA/AML Conference October 4, 2013 Presented by: John M. Geiringer.
STUDYLINK OVERVIEW FOR EDUCATION PROVIDERS Find the best way to finance your future August 2013.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Challenges Faced in Developing Audit Plans and Programs 21 st March, 2013.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Overview (Part I, PowerPoint) KDE:OCTE:WorkKeys:10/15/
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Natick Public Schools Technology Presentation February 6, 2006 Dennis Roche, CISA Director of Technology.
Experiences from a small compensation case Helena Persson Deposit Guarantee Manager Swedish National Debt Office.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
CHAPTER 9 GETTING READY FOR CRISIS. CRISES CAN BE CLASSIFIED AS:  EMERGING  ONGOING  IMMEDIATE Every School System Should Have A Policy Requiring That.
ASHRAE Staff Report: The Business of ASHRAE. ASHRAE Membership Membership up over last year – 52,1993 total members – 43,372 members in US and Canada.
Developing an Issues Management Plan Poor Crisis Management NEW YORK (AP) -- Lingering images of passengers stranded at sea for days as toilets back.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
VACAA – The Choice Program / Choice Card Fast Facts Overview
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
INTERNAL AUDIT AND INVESTIGATION SERVICES PRESENTATION TO THE PORTFOLIO COMMITTEE ON THE UNIT’S ACTIVITIES FOR THE YEAR ENDING 31 MARCH 2006 Z MXUNYELWA,
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Introducing Project Management Update December 2011.
Employee Privacy at Risk? APPA Business & Financial Conference Austin, TX September 25, 2007 Scott Mix, CISSP Manager of Situation Awareness and Infrastructure.
Chief Chip! Helping our children & young adults to stay safe online.
1 Executive Leadership of Cybersecurity Austin, TX December 3, 2014 ELOC Bank Table Top Exercise.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
MnSCU Audit Committee September 18, 2002 Discussion on the Role of the Audit Committee MnSCU Audit Committee September 18, 2002.
Information Security: Current Threats Marc Scarborough Information Security Officer
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator.
PRECONFERENCE III Advanced Strategies to Achieve ROI in Implementing HIPAA Karl Ideman, CEO Pool Administrators Inc. September 14, 2003.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
New A.M. Best Cyber Questionnaire
MEETING SCENARIOS April 18, 2017
Team 1 – Incident Response
Fraud & Internal Controls
Reporting personal data breaches to the ICO
Cyber Issues Facing Medical Practice Managers
Red Flags Rule An Introduction County College of Morris
ALICE: THE BCPS ACTIVE ASSAILANT PROTOCOL
ALICE: THE BCPS ACTIVE ASSAILANT PROTOCOL
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
ALICE: THE BCPS ACTIVE ASSAILANT PROTOCOL
ALICE: THE BCPS ACTIVE ASSAILANT PROTOCOL
ALICE: THE BCPS ACTIVE ASSAILANT PROTOCOL
ALICE: THE BCPS ACTIVE ASSAILANT PROTOCOL
Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L
Neil Kirton and Zoë Newman
ALICE: THE BCPS ACTIVE ASSAILANT PROTOCOL
ALICE: THE BCPS ACTIVE ASSAILANT PROTOCOL
Business Compromise and Cyber Threat
Anatomy of a Common Cyber Attack
The PTA Audit, 990s, and Electronic Banking
Presentation transcript:

ELOC Bank Table Top Exercise Executive Leadership of Cybersecurity Austin, TX December 3,

ELOC Bank is a $250 million commercial bank providing a comprehensive range of banking products and services. Customers connect to the bank’s online Cash Management System to complete ACH origination and wire transfers. ELOC Bank Background 2

September 2014 IT Audit Report ELOC Bank 3

The September 2014 IT Audit found that the bank’s network and systems were adequately protected. However, the following recommendations were made: Bank IT Audit Report Enhance employee training on wire & ACH payment procedures Review and update the bank’s insurance coverages for cyber incidents Add an Intrusion Prevention System (IPS) to help prevent network intrusion Conduct incident response testing and provide the Board with reports on Cyber threats and readiness 4

The IT Steering Committee researched the auditor’s recommendations and provided an estimate of the cost to the Board. December 5, 2014 Board Meeting 5 Implementation and on-going costs are higher than expected and were not budgeted.

ELOC Bank Group Interaction 1

A. Revise 2015 budget to address all recommendations by September 30, B. Cancel employee and executive bonuses and Director’s fees to pay for auditor recommendations. C.Postpone action on the audit recommendations until the February 5, 2015 board meeting. D. Add an additional guard at the computer room door to prevent system intrusion. E. Other? What Would You Do?

Why or Why Not? A. Revise 2015 budget to address all recommendations by September 30, B. Cancel employee and executive bonuses and Director’s fees to pay for auditor recommendations. C.Postpone action on the audit recommendations until the February 5, 2015 board meeting. D. Add an additional guard at the computer room door to prevent system intrusion. E. Other?

On December 5, 2014, after much deliberation, ELOC Bank’s Board decides to postpone action on the audit recommendations until the February 5, 2015 Board meeting. Action the Board Took

December 26, 2014 Service Disruption ELOC Bank 10

Help and Technical Support Desks are receiving a significant volume of calls. 2:00 pm Employees are reporting : Slow computer response time Online-banking and cash management systems are behaving erratically. 2:30 pm Customers are flooding the bank’s Help Desk and reporting: ELOC Bank’s website is slow and acting erratically Can’t reach the online banking and cash management web pages 2:45 pm National news services begin reporting: that several large banks are having similar problems 3:00 pm Staff informs CEO of all of the above. December 26,

ELOC Bank Group Interaction 2

A. Ask the IT manager for a verbal report - Wait for their recommendation and report before deciding what to do. B. Immediately call an Officer’s meeting to gather information and develop a plan of action. C. Alert appropriate staff that the IT department is aware of the issue and working on a solution. D.Launch your Incident Response Plan. E.Other? What Would You Do? 13

Why or Why Not? 14 A. Ask the IT manager for a verbal report - Wait for their recommendation and report before deciding what to do. B. Immediately call an Officer’s meeting to gather information and develop a plan of action. C. Alert appropriate staff that the IT department is aware of the issue and working on a solution. D.Launch your Incident Response Plan. E.Other?

Bank systems and operations are operating normally The IT Manager notifies the president that the bank experienced a Distributed Denial of Service (DDoS) attack earlier and that abnormal traffic activity was identified. However, the DDoS attack ended and all bank systems are operating normally. Employees are able to complete bank functions including retrieving customer ACH origination files and online wire transfer requests. All end of day processing was completed and all systems are operating normally. December 26,

December 29, 2014 Wire Transfer ELOC Bank 16

$230,000 wire transfer request arrives from Cash Management System. President’s approval is needed. President questions validity, asks the cashier if she has called the customer to confirm. Cashier says she’s already talked to the customer and he confirmed the wire going to China. The President reviews the account, and again asks the cashier if she has called and talked the customer. She again says yes, she talked to him and confirmed it. December 29,

Based upon the information known now, If you were this banker, would you: 1.Not send the wire 2.Send the wire Decision Point! 18

The customer from Monday contacts the bank and reports that $230,000 is missing from his account. He is upset and needs to make month-end payroll. After some investigation management determines that the wire was fraudulent. The bank contacts their correspondent bank to recover the funds but the money has already left the country and it is night time in China. December 30, :00 am 10:00 am

ELOC Bank Group Interaction 3

A. Activate the Incident Response Plan. B. Notify primary regulator and law enforcement. C.Return the $230,000 to the customer’s account so they can meet payroll. D.Hire an outside expert to conduct an investigation and forensics analysis. E. Review insurance coverage. F. Other? What Would You Do? 21

Why or Why Not? 22 A. Activate the Incident Response Plan. B. Notify primary regulator and law enforcement. C.Return the $230,000 to the customer’s account so they can meet payroll. D.Hire an outside expert to conduct an investigation and forensics analysis. E. Review insurance coverage. F. Other?

Exercise Scenario Summary 1. Delayed Audit Action 2. Internet and System Disruption Incident Response testing and updating 3. Fraudulent Wire Transfer Incident Response testing and updating Wire procedures training Insurance review related to Cybersecurity 23

Culture of Security Tone from the Top Educate staff & customers Incident Response Plan Realistic Testing of Plans Review Insurance Threat intelligence and collaboration Executive Leadership of Cybersecurity 24

FFIEC.GOV 25