decrease cyber risk at your community bank

19
DECREASE CYBER RISK AT YOUR COMMUNITY BANK Manish Rai & Ty Powers, Great Bay Software

Upload: great-bay-software

Post on 14-Feb-2017

57 views

Category:

Software


0 download

TRANSCRIPT

Page 1: Decrease Cyber Risk at your Community Bank

DECREASE CYBER RISK AT YOUR COMMUNITY BANKManish Rai & Ty Powers, Great Bay Software

Page 2: Decrease Cyber Risk at your Community Bank

2

AGENDA

• Current challenges faced by community banks

• Getting started with the new CAT tool & FFIEC Audits

• Best practices for:

- Plugging potential cyber gaps

- Addressing network access control

Page 3: Decrease Cyber Risk at your Community Bank

3

GREATEST CHALLENGES FACING FINANCIAL SERVICES ORGANIZATIONS

Page 4: Decrease Cyber Risk at your Community Bank

4

FFIEC CYBERSECURITY ASSESSMENT TOOL (CAT) MEASURES RISK AND MATURITY ACROSS 5 DOMAINS

D1. Cybersecurity Risk Management & Oversight

• Governance

• Risk Management

• Resources

• Training & Culture

D2. Threat Intelligence & Collaboration

• Threat Intelligence

• Monitoring & Analysis

• Information Sharing

D3. Cybersecurity Controls

• Preventative

• Detective

• Corrective

D4. External Dependency Management

• Connections

• Relationship Management

D5. Cybersecurity Incidence Management & Resilience

• Incidence Resilience Planning & Strategy

• Detection, Response and Mitigation

• Escalation & Reporting

Page 5: Decrease Cyber Risk at your Community Bank

5

FFIEC CAT INHERENT RISK AND MATURITY LEVELS MEASUREMENT MODEL

Page 6: Decrease Cyber Risk at your Community Bank

6

FFIEC CYBERSECURITY ASSESSMENT TOOL

• Why the FFIEC CAT?• Developed by the Federal Financial Institutions Examination Council (FFIEC) to help

institutions identify their risks and determine their cybersecurity maturity.

• What is it used for?• Provides institutions with a repeatable and measureable process to inform

management of their institution’s risks and level of cybersecurity preparedness

Page 7: Decrease Cyber Risk at your Community Bank

7

COMPLETING THE CAT ASSESSMENT

• Assess the institution’s inherent risk profile based on five categories• Technologies and Connection Types

• VPN, Wireless, LAN to LAN, ISP • Delivery Channels

• Online, Mobile delivery, ATM• Online/Mobile Products and Technology Services

• Payment services, wire transfers, remote banking• Organizational Characteristics

• M&A, # employees, # contractors, locations (branch, office, and data centers)• External Threats

• Volume and type of attacks (attempted or successful)

Page 8: Decrease Cyber Risk at your Community Bank

8

COMPLETING THE CAT ASSESSMENT

• Evaluate the institution’s Cybersecurity Maturity level for the five domains• Cyber Risk Management and Oversight

• Cybersecurity program including policies and procedures• Threat Intelligence and Collaboration

• Tools and processes to effectively discover, analyze, and understand cyber threats• Cybersecurity Controls

• Practices and processes used to protect assets, infrastructure, and information• Continuous, automated protection and monitoring

• External Dependency Management• Program to oversee and manage external connections and third-party relationships

• Cyber Incident Management and Resilience• Establishing, identifying, and analyzing cyber events

Page 9: Decrease Cyber Risk at your Community Bank

9

DESIGN AND IMPLEMENT SECURITY CONTROLS

• Access controls on customer information systems• Authenticate and permit access only to authorized individuals• Prevent employees from providing customer information to unauthorized

individuals

• Physical Access Restrictions• Restrict access at physical locations containing customer information, to authorized

individuals only

• Employ the use of Encryption• Encrypt electronic customer information, while in transit as well as in storage

• on networks or systems to which unauthorized individuals may have access

Page 10: Decrease Cyber Risk at your Community Bank

10

DESIGN SECURITY CONTROLS

• Minimum Security Baseline and Control Process• Procedures designed to ensure that system modifications are consistent with the

community bank’s information security program

• Personnel Controls• Implement segregation of duties and personnel background checks

• Monitoring Systems• Monitoring systems and procedures to detect actual and attempted attacks on, or

intrusions into, customer information systems

• Incident Response• Implement procedures to be taken when unauthorized access or other incidents are

detected• Actions including reporting to regulatory and law enforcement agencies

Page 11: Decrease Cyber Risk at your Community Bank

11

EDUCATE, TEST, AND OVERSEE

• Educate and Train Staff• Train staff to recognize and respond to threats including fraud and identity theft• Provide staff with adequate training around computing and information security• Train staff on how to properly dispose of customer data

• Test Key Controls• Test and validate the procedures and systems put in place

• The risk assessment should drive frequency and scope

• Oversee Service Providers• Exercise due diligence in selecting service providers• Monitor and hold them accountable for adhering to the FFIEC Security Guidelines

Page 12: Decrease Cyber Risk at your Community Bank

12

BEST PRACTICES

• Policies, Procedures, and Action• Practice what you preach

• Execute the information security strategy and plans as designed

• Leverage the Network Infrastructure• Control access to the network

• Limit network access to approved devices (Authenticate, Authorize, and Audit)• Ensure proper network segmentation

• Reduce the available attack surface and limit the contamination or threat• Keep the perimeter intact

• Avoid internet-facing endpoints and services where possible

Page 13: Decrease Cyber Risk at your Community Bank

13

BEST PRACTICES

• Don’t Forget About the Endpoints• Make sure that you can answer the following at all times:

• What’s connecting to the network?• Where is it located?• How is it behaving?• Do I trust it? Should I?

• Disable remote access to devices as possible• Remote access provides a conduit to vulnerable devices

• Change default credentials immediately• Disable default admin accounts

Page 14: Decrease Cyber Risk at your Community Bank

14

BEST PRACTICES

• Don’t Forget About the Endpoints - Continued• Disable/Limit protocol usage

• Disable unsecure protocols such as Telnet and FTP as possible• Best practice for many regulatory guidelines

• Ensure that communication ports that should be open are• Are SSH, Telnet and HTTP ports still open?• Some attacks disable remote access to limit remediation

• Patch, patch, patch• Patch early and patch often• Not always possible

Page 15: Decrease Cyber Risk at your Community Bank

15

BEST PRACTICES

• Don’t Forget About Tomorrow• Choose solutions not point products• Deploy highly scalable systems that will mature with the organization• Look for solutions that enhance existing systems• Avoid creating information siloes• Choose vendors and integrators that provide the same level of service that you

provide to your customers

Page 16: Decrease Cyber Risk at your Community Bank

16

SECURITY AND MANAGEMENT TOOLS NEEDED FOR COMPLIANCE

Vulnerability ScannerAdvanced Threat Detection

Anti-Virus Firewall Discovery, Visibility andNetwork Access Control

Log and EventManagement

Intrusion Detectionand Prevention

Page 17: Decrease Cyber Risk at your Community Bank

17

KEY CAT TOOL NETWORK ACCESS CONTROL REQUIREMENTS UNDER PREVENTATIVE AND DETECTIVE CONTROLS

Disc

over

y • Unregistered / Unauthorized Devices

• Rogue Access Points• Critical Systems

Running Legacy Technologies

Visib

ility

/Mon

itorin

g • Network Ports• FTP / Telnet Traffic• Anomalous Behavior• Real-time Network

Monitoring

Cont

rol • Unauthorized Access

• Unregistered Device Access

• Roque Access Points• Network

Segmentation• Traffic Between

Trusted / Untrusted Zones

• Wi-Fi Security Settings (Strong)

Page 18: Decrease Cyber Risk at your Community Bank

18

GREAT BAY VISION

Network Access Control

Know• Monitor Port Usage• Networking Monitoring• Anomalous Behavior Detection• FTP/Telnet Traffic

Control• Unauthorized Access• Rogue Access Points• Network Segmentation• Trusted/Untrusted Zones

Enhance• Asset Inventory/Management• Incidence Response• Troubleshooting

See• Discover in Real-time• Unauthorized/Unregistered• Rogue Access Points

Page 19: Decrease Cyber Risk at your Community Bank

THANK YOU! QUESTIONS?