Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 ID Management in Financial Services – May 2005 Online Fraud Trends – Staying Ahead of the Threats Matthew Biliouris, Information Systems Officer – NCUA.

Similar presentations


Presentation on theme: "1 ID Management in Financial Services – May 2005 Online Fraud Trends – Staying Ahead of the Threats Matthew Biliouris, Information Systems Officer – NCUA."— Presentation transcript:

1 1 ID Management in Financial Services – May 2005 Online Fraud Trends – Staying Ahead of the Threats Matthew Biliouris, Information Systems Officer – NCUA

2 ID Management in Financial Services – May 2005 2 Credit Union Industry Statistics

3 ID Management in Financial Services – May 2005 3 Credit Union Industry Statistics

4 ID Management in Financial Services – May 2005 4 Credit Union Industry Statistics

5 ID Management in Financial Services – May 2005 5 Credit Union Industry Statistics

6 ID Management in Financial Services – May 2005 6 Risk Assessment Process 2. Understand Risks 3. Prioritize Risks 4. Develop & Implement Action Plans 5. Monitor 1. Identify Risks

7 ID Management in Financial Services – May 2005 7 Security Programs Gramm-Leach-Bliley Act – 501(b) – Outlines Specific Objectives – Requires NCUA establish standards for safeguarding member records

8 ID Management in Financial Services – May 2005 8 Security Programs Credit Unions Must Have Process in Place to: – Ensure Security & Confidentiality of Member Records – Protect Against Anticipated Threats or Hazards – Protect Against Unauthorized Access Specifically Stated in §748.0(b)(2)

9 ID Management in Financial Services – May 2005 9

10 10 Security Programs Appendix A – Guidelines for Safeguarding Member Information – Involvement of Board of Directors – Assess Risk – Manage & Control Risk – Oversee Service Providers – Adjust the Program – Report to the Board

11 ID Management in Financial Services – May 2005 11 Security Programs Response Program Guidance – Increasing Number of Security Events – Congressional Inquiries – GLBA Interpretation – FFIEC Working Group – Revise Part 748-Add New Appendix B

12 ID Management in Financial Services – May 2005 12 Security Programs Credit Unions Must Have Process in Place to: – Ensure Security & Confidentiality of Member Records – Protect Against Anticipated Threats or Hazards – Protect Against Unauthorized Access – Respond to Incidents of Unauthorized Access to Member Information

13 ID Management in Financial Services – May 2005 13

14 ID Management in Financial Services – May 2005 14 Security Programs Appendix B – Guidance on Response Programs – Components of a Response Program Assessing Incident Notifying NCUA/SSA Notifying Law Enforcement Agencies Containing/Controlling Incident Notifying Affected Members

15 ID Management in Financial Services – May 2005 15 Security Programs Appendix B – Guidance on Response Programs – Content of Member Notice Account/Statement Review Fraud Alerts Credit Reports FTC Guidance

16 ID Management in Financial Services – May 2005 16 PART 748 APPENDIX B Conflict with State Law – e.g., California Notice of Security Breach statute – Requires notice to California residents when unencrypted member information is or may have been acquired by unauthorized person – Gramm Leach Bliley Preemption Standards: no intent to preempt where state law provides greater consumer protections

17 ID Management in Financial Services – May 2005 17 NCUA Expectations Potential Questionnaire: – Incorporated into Overall Security Program – Escalation Process / Incident Response – Review of Notices – Attorney Review? – Enterprise Wide Approach – Reporting to Senior Management – Member Outreach / Awareness Programs – Employee Training Programs

18 ID Management in Financial Services – May 2005 18 “Phishing”

19 ID Management in Financial Services – May 2005 19 “…The use of digital media also can lend fraudulent material an air of credibility. Someone with a home computer and knowledge of computer graphics can create an attractive, professional-looking Web site, rivaling that of a Fortune 500 company…” Arthur Levitt Former Chairman of the SEC Quotes

20 ID Management in Financial Services – May 2005 20 Phishing 101  Phishing uses e-mail to lure recipients to bogus websites designed to fool them into divulging personal data.

21 ID Management in Financial Services – May 2005 21 Phishing 101  E-mail  Spoofed address  Convincing  Sense of urgency  Embedded link (but not always)

22 ID Management in Financial Services – May 2005 22 Phishing Trends Anti-Phishing Working Group Industry association focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing. APWG Members - Over 400 members - Over 250 companies - 8 of the top 10 US banks - 4 of the top 5 US ISPs - Over 100 technology vendors - Law enforcement from Australia, CA, UK, USA

23 ID Management in Financial Services – May 2005 23 Phishing Trends Source: APWG Phishing Attach Trends Report - March 2005

24 ID Management in Financial Services – May 2005 24 Source: APWG Phishing Attach Trends Report – March 2005 Phishing Trends

25 ID Management in Financial Services – May 2005 25 Source: Anti-Phishing Working Group Phishing Archive Examples (June 2004)

26 ID Management in Financial Services – May 2005 26 Source: Anti-Phishing Working Group Phishing Archive Examples (June 2004)

27 ID Management in Financial Services – May 2005 27 Source: Anti-Phishing Working Group Phishing Archive Examples (June 2004)

28 ID Management in Financial Services – May 2005 28 Source: Anti-Phishing Working Group Phishing Archive Examples (June 2004)

29 ID Management in Financial Services – May 2005 29 Examples (March 2004) Source: Anti-Phishing Working Group Phishing Archive

30 ID Management in Financial Services – May 2005 30 Examples (March 2004) Source: Anti-Phishing Working Group Phishing Archive

31 ID Management in Financial Services – May 2005 31 Examples (May 2004) Source: Anti-Phishing Working Group Phishing Archive

32 ID Management in Financial Services – May 2005 32 Training / Policy Development Awareness Handling complaints & reports of suspicious e-mails/sites Protect on-line identity of credit union Response Plan Phishing Action Plans – Employee Education

33 ID Management in Financial Services – May 2005 33 Communication Methods Internet Banking Agreements Newsletters Statement Stuffers Recordings when on “hold” Website (FAQs / Advisories / Links) Phishing Action Plans – Member Education

34 ID Management in Financial Services – May 2005 34 Action Plan Ideas - Education

35 ID Management in Financial Services – May 2005 35 Action Plan Ideas - Education

36 ID Management in Financial Services – May 2005 36 Action Plan Ideas - Education

37 ID Management in Financial Services – May 2005 37 Content We will never ask for xxx via e-mail We will never alert you of xxx via e-mail Always feel free to call us at # on statement Always type in our site URL (see statement / newsletter / previous bookmark) Phishing Action Plan Ideas – Member Education

38 ID Management in Financial Services – May 2005 38 Content (cont’d) Sites can be convincingly copied Report suspicious e-mails & sites Where to get more advice on phishing Importance of patching How to validate site (via cert or seal) Where to go for ID theft help Phishing Action Plan Ideas – Member Education

39 ID Management in Financial Services – May 2005 39 Considerations:  Keep certificates up-to-date  Practice good domain name controls Don’t let URLs lapse Purchase similar URLs / Search for similar URLs Phishing Action Plan Ideas – Protection of CU’s Online Identity

40 ID Management in Financial Services – May 2005 40 NCUA  (8/03) LTR 03-CU-12 Fraudulent Newspaper Advertisements, and Websites by Entities Claiming to be Credit Unions (04/04) LTR 04-CU-05 Fraudulent E-Mail Schemes (05/04) LTR 04-CU-06 E-Mail & Internet Related Fraudulent Schemes Guidance FFIEC Agency Brochure Phishing Resources

41 ID Management in Financial Services – May 2005 41 Action Plan Ideas - Education

42 ID Management in Financial Services – May 2005 42 Action Plan Ideas - Education

43 ID Management in Financial Services – May 2005 43 Inside the Examiner’s Playbook Think Globally Vendor Management Security Program (Part 748) Employee Remote Access Risk Assessment Patch Management IDS/Incident Response Virus Definition Updates BCP Formal Policies

44 ID Management in Financial Services – May 2005 44

45 ID Management in Financial Services – May 2005 45

46 ID Management in Financial Services – May 2005 46

47 ID Management in Financial Services – May 2005 47 FFIEC IT Handbook

48 ID Management in Financial Services – May 2005 48 FFIEC IT Examination Handbook Development & Acquisition Management Operations Outsourcing Retail Payment Systems Wholesale Payment Systems Issued: BCP Information Security Supervision of TSPs Audit E-Banking Fedline

49 ID Management in Financial Services – May 2005 49

50 ID Management in Financial Services – May 2005 50

51 ID Management in Financial Services – May 2005 51

52 ID Management in Financial Services – May 2005 52 Contact Information: Matthew Biliouris 703-518-6394 matthewb@ncua.gov Questions??


Download ppt "1 ID Management in Financial Services – May 2005 Online Fraud Trends – Staying Ahead of the Threats Matthew Biliouris, Information Systems Officer – NCUA."

Similar presentations


Ads by Google