Cybercrime and Regulatory Priorities for Cybersecurity

advertisement
NRS Technology and Communication Compliance Forum
Cybercrime and Regulatory
Priorities for Cybersecurity
© Copyright 2014 by K&L Gates LLP. All rights reserved.
Sean P. Mahoney
sean.mahoney@klgates.com
K&L Gates LLP
State Street Financial Center
One Lincoln Street
Boston, MA 02111
(617) 261-3202
WHAT WE WILL COVER TODAY







Drivers of cybercrime on your firm
Activities that increase risk
Exploring real life examples
SEC pilot exams and NEP Sweep Alert
Current relevant regulation
Current efforts of FINRA and SEC
Managing implications of increased
accountability
DRIVERS OF CYBERCRIME ON YOUR FIRM
 Verizon 2014 Data Breach Investigations Report
identifies the following threats





POS Intrusions
Cyber-espionage
Web App Attacks
Insider Misuse
Crimeware





Miscellaneous Errors
Card Skimmers
Physical Theft/Loss
DoS Attacks
Other
DRIVERS OF CYBERCRIME ON YOUR FIRM
 Web App attacks and POS intrusions appear to
be on the rise
 Web App attack and DoS attacks are most
prevalent cyber-attacks in financial services
 According to American Bankers Association,
two-thirds of the instances of unauthorized
access are the results of phishing attacks
 Success rate of phishing emails is approximately 18%
according to Verizon
DRIVERS OF CYBERCRIME ON YOUR FIRM
 Motivation for attacks generally falls within three
broad categories
 Financial gain
 Ideologically motivated attacks (social, political or
sport/narcissism)
 State sponsored
ACTIVITIES THAT INCREASE RISK
 Connectivity
 Devices
 Networks/clouds
 Products
 Use of vendors
 Use of humans
EXPLORING REAL LIFE EXAMPLES
 Data management makes responses
manageable
 Need to know what data was access or could be
comprised
 In some cases need to be able to identify data
subjects in order to reduce reporting obligations
 Watch for behaviors indicative of employees
who may be ready to leave the company
EXPLORING REAL LIFE EXAMPLES
 Control access
 Employees
 Vendors
 Monitor application vulnerabilities and log
installation of patches and security updates
 Test process for user access when passwords or
credentials are lost
 Test user susceptibility to phishing attempts
SEC PILOT EXAMS AND SWEEP ALERT
 SEC approach historically has appeared
sporadic
 Sparse regulations (S-P, S-ID, compliance program
rules, Rule 15c3-5 for broker-dealers)
 Enforcement actions under Regulation S-P following
hacking events
 Proposed information security program/data security
breach reporting regulations
 This year:
 SEC Roundtable
 OCIE alert
SEC PILOT EXAMS AND SWEEP ALERT
 Takeaways from SEC Roundtable
 Identify most significant risks and focus
resources on addressing them
 A static set of policies is not sufficient
 Aim for a well-conceived, flexible, and forwardthinking program to address ever-changing risks
 The industry is collaborating
 Financial Services Information Sharing and
Analysis Center
 Have an incident response plan
SEC PILOT EXAMS AND SWEEP ALERT
 April 15, 2014 -- SEC OCIE published a
National Exam Program Risk Alert setting
forth OCIE expectations for RIAs and BDs
with respect to cybersecurity
 50 RIA’s and BD’s will be examined
 Alert includes a sample document request
 Main takeaway is that SEC expects RIAs and
BDs to use the National Institute of Standards
and Technology (NIST) Framework
SEC PILOT EXAMS AND SWEEP ALERT
 Specific documents requested (or
expected)
 Written information security policy (Regulation
S-P, Regulation S-ID, Massachusetts)
 Documentation of responsibilities of
employees and managers for cybersecurity
 Written guidance and periodic training for
employees and vendors
SEC PILOT EXAMS AND SWEEP ALERT
 Specific documents requested (or
expected)
 Data destruction policy (Regulation S-P;
Massachusetts; FACT Act)
 Records management program is essential for
cybersecurity and for a number of other reasons
 Written cybersecurity incident response policy
(i.e., “playbook”)
 Written policy and training addressing
removable and mobile media
SEC PILOT EXAMS AND SWEEP ALERT
 Specific documents requested (or
expected)
 Vendor management
 information security questionnaires
 cybersecurity contractual requirements
 Written incident alert thresholds
SEC PILOT EXAMS AND SWEEP ALERT
 Other requests (or expectations)
 Written inventories and assessments
 Chief Information Security Officer
 Identification of standards (such as NIST)
used by firm
 Expectation that firm has process to keep up with
emerging best practices (e.g., FS-ISAC)
 Protection against DDoS attacks
 Cybersecurity insurance
CURRENT RELEVANT REGULATION
 Laws that protect information




SEC rules
Title V of Gramm-Leach-Bliley
State laws
Fair Credit Reporting Act/Regulation S-ID
 Regulatory data security standards
 FFIEC
 NIST Framework
 Regulatory business continuity standards
CURRENT RELEVANT REGULATION
 Rule 15c3-5 (Exchange Act)
 requires broker-dealers with market access to
maintain policies and procedures to protect
“information and information systems from
unauthorized access, use, disclosure,
disruption, modification, perusal, inspection,
recording or destruction”
 Seems to be viewed as imposing a general
requirement to address cybersecurity
CURRENT RELEVANT REGULATION
 Rule 206(4)-7 (Advisers Act); Rule 38a-1 (’40
Act)
 Require compliance policies and procedures
 SEC noted in preamble to Rule 38a-1 that business
continuity obligations fall under advisers’ fiduciary
duties
 FINRA Rules
 3012/3020 – risk management
 4370 – business continuity
CURRENT RELEVANT REGULATION
 Title V of the Gramm-Leach-Bliley Act
 Title V of the GLBA protects “nonpublic
personal information,” which is defined as any
personally identifiable financial information
 provided by a consumer to a financial institution
 resulting from a transaction by a consumer with a
financial institution
 otherwise obtained from a financial institution
 NPI includes customer lists
CURRENT RELEVANT REGULATION
 GLBA Safeguards Rule
 All financial institutions must develop a written
information security plan that must:




be appropriate to the financial institution's risk profile
designate the employee or employees to coordinate
identify and assess the risks
evaluate the effectiveness of current safeguards for
mitigating risks
 select appropriate service providers and require them to
implement the safeguards
 evaluate the program
CURRENT RELEVANT REGULATION
 State data security and breach reporting laws
 State laws enacted in response to data security
breaches and growing concern of identity theft
 Most statutes impose data security breach notification
requirements
 Some states, most notably Massachusetts, impose an
obligation to adopt policies and procedures to protect
information
 Compliance with Interagency Standards is often sufficient
 Information protected generally consists of a name
plus another identifier that would enable a person to
obtain credit or access an account
CURRENT RELEVANT REGULATION
 Interagency Guidance on Authentication
(applicable only to banks)
 Requires risk assessments taking into
account new and evolving threats
 Sets expectation of layered security
 Fraud detection and monitoring
 Dual authorization through different access
devices
 Use of out-of-band verification for transactions
 IP reputation-based tools
CURRENT RELEVANT REGULATION
 FFIEC Information Security Handbook
 Serves as bank examination manual for
compliance with GLBA safeguards rule
 Establishes information security risk
management process
 Information security risk assessment
 Information security strategy
 Security controls implementation
 Security monitoring
 Security process monitoring and updating
CURRENT RELEVANT REGULATION
 FFIEC Business Continuity Handbook
 Business continuity planning process includes
 Policy by which firm manages identified risks
 Allocation of resources and knowledgeable
personnel
 Independent review
 Training and awareness
 Regular, enterprise-wide testing
 Continuous updating to adapt to changing
environment
CURRENT RELEVANT REGULATION
 FFIEC Business Continuity Handbook
 Policy should address
 Continuity planning process
 Prioritization of business objectives and critical
operations essential for recovery
 Integration with financial markets
 Integration with vendors and outsourced services
 Regular updates in response to changes in
business processes, audit recommendations and
testing
CURRENT RELEVANT REGULATION
 FFIEC Business Continuity Handbook
 Principal tools in continuity planning
 Data synchronization tools
 Pre-established crisis management team
 Incident response procedures
 Remote access
 Employee training
 Clear notification standards
 Insurance
CURRENT RELEVANT REGULATION
 NIST Framework
 Risk management/process management
approach
 Scalable
 “Core” set of cybersecurity activities
 Identify
 Protect
 Detect
 Respond
 Recover
CURRENT EFFORTS OF FINRA AND SEC
 FINRA and the SEC are clearly moving to a riskbased framework for cybersecurity
 Using newly discovered authority as systemic or
prudential regulators of securities industry
 SEC roundtable provided informal guidance
 SEC OCIE NEP Alert provides clearest outline of
regulatory expectations to date
 FFIEC guidance is also worth tracking
CURRENT EFFORTS OF FINRA AND SEC
 Expectation that all financial institutions maintain current
awareness of cybersecurity threats
 FFIEC “encourages” all financial institutions to
participate in the Financial Services Information Sharing
and Analysis Center (FS-ISAC)
 Other sources to monitor:
 FBI Infragard (www.infragard.org)
 U.S. Computer Emergency Readiness Team (www.us-cert.gov)
 U.S. Secret Service Electronic Crimes Task Force
(www.secretservice.gov/ectf.shtml)
CURRENT EFFORTS OF FINRA AND SEC
 After assessing cybersecurity at 500 community
banks, FFIEC commented on the following:
 Cybersecurity Inherent Risk
 Connection types
 Products and services
 Technologies used
 Cybersecurity Preparedness





Risk management
Threat intelligence and collaboration
Cybersecurity controls
External dependency management
Cyber incident management and resilience
CURRENT EFFORTS OF FINRA AND SEC
 SIFMA White Paper
 Industry is asking for regulatory guidance on
cybersecurity
 Outlines 10 risk-based principles
 Avoid prescriptive rules
 Industry needs guidelines to demonstrate
compliance and proper risk-management
 Current inspection and post-breach enforcement
action model does not work
 May be the beginning of the conversation
INCREASED ACCOUNTABILITY
 An integrated approach to data security is key
 Involve human resources -- humans are often the
weak link in cybersecurity
 Business managers need to be involved in technical
solutions -- secure environment has to be usable or
people will work around it
 Compliance
 Information systems
 Physical security
INCREASED ACCOUNTABILITY
 Understand tools and technology available
 IT professionals need to train others on current
capabilities and possible expansion
 Where monitoring is conducted, follow-through is
critical
 Data needs to be managed
 Records retention/destruction schedules
 Many legal implications (spoliation, statutory and
regulatory retention requirements)
INCREASED ACCOUNTABILITY
 Vendors need to be managed
 Document everything
 regulated institutions must prove that they manage
risks
 Have incident response teams in place
 Playbook in place
 Have public relations firm ready
 Include outside counsel and attorney/client privilege
Download