Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,

Slides:



Advertisements
Similar presentations
MONITORING OF SUBGRANTEES
Advertisements

Agenda What is Compliance? Risk and Compliance Management
Technology Supervision Branch New FFIEC Guidance on Strong Authentication ABA Webcast January 11, 2006.
1 ID Management in Financial Services – May 2005 Online Fraud Trends – Staying Ahead of the Threats Matthew Biliouris, Information Systems Officer – NCUA.
Chapter 12: Regulatory Compliance for Financial Institutions.
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
E B a n k i n g Information Security Guidelines ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002.
Security Controls – What Works
Information Security Policies and Standards
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Directors’ College 2007 Protecting Your Customers’ Privacy A Directors’ Guide to GLBA By David Abbott, FDIC IT Examiner.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Factors to be taken into account when designing ICT Security Policies
Stephen S. Yau CSE , Fall Security Strategies.
Guidance for Managing Third-Party Risk Chicago Region Regulatory Conference Call December 8, 2010.
Step 1: A.User enters id/pw for FI: encrypted in Quicken PIN vault B.Id/pw transmitted to Intuit CustomerCentral Servers at NCR using 128 bit SSL Step.
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15 September 2012.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Website Hardening HUIT IT Security | Sep
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Revisions to the FFIEC BSA/AML Examination Manual and Federal Reserve Board BSA/AML Examination Findings and Issues Timothy P. Leary Senior Special AML.
Due Diligence - The Regulator’s Perspective ABA Telephone/Webcast Briefing August 14, 2001 Cynthia Bonnette, Assistant Director FDIC Bank Technology Group.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
MCUL – Key Regulatory Issues MCUL’s Regulatory Affairs strategy and focus revolve around the central themes of advocacy, information, and implementation.
Evolving IT Framework Standards (Compliance and IT)
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
September 14, David A. Reed Attorney at Law Reed & Jolly, PLLC (703)
AUTHENTICATION IN AN INTERNET ENVIRONMENT Dominick E. Nigro NCUA Information Systems Officer.
© BITS BITS and FSSCC R&D Efforts John Carlson Senior Vice President of BITS Panel on Data Breaches in Payments Systems-- Roles and Best Practices.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Forward-Looking Bank Supervision 2010 Kansas City Region Regulatory Conference Call August 24, 2010.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.1.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
FFIEC Cyber Security Assessment Tool
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
February 2, 2016 | Chicago NFA Cybersecurity Workshop.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
NCUA Update Alaska Credit Union League 42 nd Annual Meeting Elizabeth A. Whitehead, Region V Director National Credit Union Administration.
Cyber Threat Intelligence Program Primer NASCUS August 1, 2016 Chicago, IL Christina Saari, Senior Cyber Intelligence Officer National Credit Union Administration.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
JOHN M. HUFF NAIC PRESIDENT DIRECTOR, MISSOURI DEPARTMENT OF INSURANCE JUNE 16, 2016 NAIC CYBERSECURITY INITIATIVES.
NCUA Consumer Compliance
Law Firm Data Security: What In-house Counsel Need to Know
Cybersecurity - What’s Next? June 2017
I have many checklists: how do I get started with cyber security?
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
John Carlson Senior Director, BITS
NERC Cyber Security Standard
University of Maryland Robert H. Smith School of Business
Presentation transcript:

Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10, 2003

Agenda Overview of Technology Supervision Top Security Concerns Recent Regulatory Efforts to Improve Guidance Other Initiatives Next Steps

Overview of Technology Supervision Financial Institutions supervised through the FFIEC –Member Agencies: OCC, FRB, FDIC, OTS & NCUA Interagency IT Sub-Committee responsible for: –Issuing information technology guidance –Supervising service providers & software vendors –Working w/government, industry & other bank supervisors (e.g., FBIC, BITS & BIS) Consistent lnteragency Rating System used by all agencies Reference:

Top Security Concerns Identity Theft –Top concern among financial institutions –Additional customer protection requirements likely Quality of Software Issues –Virus abuse, offshore concerns, development in general DOS attacks Internal threats –Insider abuse of network access still a key concern Note: FIs beginning to be targeted/Incident reporting still low

Recent Efforts to Improve Guidance FFIEC Handbooks Recently revised FFIEC handbook into a set of “Booklets” –Issued Booklets on information security, business continuity & technology service providers –Others under development (IT outsourcing, development and acquisition, electronic banking, payments, etc.) Reference:

FFIEC Information Security Handbook Info Security Risk Assessment & Control Process Prevention Detection Recovery Investigation Code Reviews/Testing Firewalls/PKI Governance Policies ForensicAnalysis Monitoring & Updating EvidenceHandling IncidentManagement SoftwarePatching PolicyAmendment ReinstateService Virus Scan/Content Filtering Encryption Intrusion Detection CIRT Strategy Service Provider Oversight Threat & Vulnerability Risk Assessment Logging Testing Personnel Screening

Recent Efforts…. GLBA First step toward extending banks’ info security programs to specifically safeguard of customer information Banks security programs must comply w/6 requirements: –Board of Directors and management oversight –Risk assessment –Managing & controlling risk –Service provider oversight –Adjusting the security program –Reporting to the Board Banks generally in compliance Improvement needed in performing risk assessments and reporting to the Board

Recent Efforts...Incident Response Interagency “Incident Response” Letter distributed for public comment in August Proposed guidance: –Requires banks to develop a response program to protect against threats to customer information maintained the by the bank or its service provider –Further describes the components of a response program, which includes procedures for notifying customers about incidents of unauthorized customer information that could result in substantial harm or inconvenience to the customer Reference: g /edocket.access.gpo.gov/2003/pdf/ pdf

Other Internal Regulatory Initiatives Established Cyber-Security Working group within FRS to: –Identify emerging cyber security risk issues & business practices –Identify gaps in existing guidance –Improve communication throughout the System Working w/other Reserve banks & agencies to strengthen guidance Working w/other regulators to improve awareness through outreach

Other Internal Regulatory Initiatives Cyber-Security Awareness sessions w/industry experts Improve cyber awareness through via FRB Intranet Increase awareness of existing guidance (internal & external) Developed Cyber “Health Check & Strengthened reporting Collaborate on issues w/internal technology specialists Developing detailed examiner guidance in emerging areas

Next Steps….. Develop guidance to support emerging business practices Some areas that may warrant additional guidance include: –Vulnerability assessment –Penetration testing –IDS –Forensics