financial institution cybercrime powerpoint

11
Handling the Handling the Crisis: Crisis: The Response of a The Response of a Financial Financial Institution Institution Karina Levitas – Chief Financial Officer Drew Brooks – VP of Public Relations Kayla Rizzoli – Chief Information Officer Zere Kabyl-Fazyl – Chief Information Security Officer Mark Lyubovitsky – General Counsel

Upload: skagensnake

Post on 21-Jun-2015

1.256 views

Category:

Technology


0 download

DESCRIPTION

Powerpoint for Cybercrime, Espionage, and Warfare class at American University.

TRANSCRIPT

Page 1: Financial Institution Cybercrime Powerpoint

Handling the Crisis: Handling the Crisis: The Response of a The Response of a

Financial InstitutionFinancial Institution

Karina Levitas – Chief Financial Officer

Drew Brooks – VP of Public Relations

Kayla Rizzoli – Chief Information Officer

Zere Kabyl-Fazyl – Chief Information Security Officer

Mark Lyubovitsky – General Counsel

Page 2: Financial Institution Cybercrime Powerpoint

Scenario 1: India signs a trade deal with Taiwan. Tensions between China and Taiwan increase. Cyber activism from both sides has increased dramatically. The UN Security Council has been summoned for an emergency meeting. During this time the global ISP has suffered a massive DDOS attack originating from South Korea.

Page 3: Financial Institution Cybercrime Powerpoint

PR – Distributed Denial of Service attack unrelated to India- Taiwan agreement; internal investigatory audit of our cyber security assets.

CISO - The CISO reports directly to CEO identifying those responsible for record keeping on cyber security; security programs should be aligned with overall business objectives; 12 Layers of Security implemented; keep up to date with ICCS recommendations and Singapore standards.

CIO – Expand technology; participate in US forum; contact Financial Task Force.

CFO – Assess all vulnerabilities; contact affected customers; meet with risk management team; contact Secret Service.

Legal - Analyze cyber liabilities, ensure protection of personally identifiable information (PII) in order to avoid high-risk litigation; review international laws in Asian countries.

Page 4: Financial Institution Cybercrime Powerpoint

Scenario 2: An “advanced persistent threat” has been realized within all major global networks who use the ISP’s backbone. The Financial Institution suffers a major breach impacting the integrity of market data. The Indian government discovers that a Russian hacker crew has penetrated Mumbai’s major data warehousing networks.

Page 5: Financial Institution Cybercrime Powerpoint

PR – Make public statement –all financial assets all secure; bring external cyber security experts to conduct forensics and double the cyber security allocation within IT budget.

CISO – Ensure intrusion detection system’s full operation and manage an immediate incident response to the breach; contact US Cert to comply with secure coding standards.

CIO - Isolate compromised data ; work to restore any altered data to its correct form based on the back up system; identify the vulnerability; ensure a patch is made; find red team’s and blue team’s through the Financial Task Force.

CFO - Utilize back up mechanisms to ensure financial data is uncompromised; sculpt larger budget for technology spending; contact Secret Service Financial Institution Task Forces and contact the International Financial Institutions Anticorruption Taskforce; coordinate with CIO to identify best practices; ensure business continuity.

Legal – Work with CFO and CIO to ensure effective network security to combat loss of data, information, or personal information of our customers.; review vendor contracts; participate in investigations with international law enforcement agencies; contact G-24.

Page 6: Financial Institution Cybercrime Powerpoint

Scenario 3: China invades Taiwan --and Chinese nationalist hackers flex their muscles.

Page 7: Financial Institution Cybercrime Powerpoint

PR - Threaten to freeze assets of Chinese nationals and corporations associated with the organized hacking if attack on our database originates from China.

CISO - Accentuate efforts on risk management; develop a broad-based framework for managing risk; updated security briefings; secure connection devices.

CIO – Temporarily isolate Chinese and Taiwanese accounts; verify account activity through spot checking and trend watching; isolate US accounts because of the inflammatory nature of the US response.

CFO -  Determine if hacking threats have damaged financial investments in the Asian region; conduct business cost benefit analysis; discuss and implement options of freezing transactions with US, Taiwanese and Chinese accounts.

Legal - Ensure the procedures and processes are in place to quickly advise customers and other third parties of a theft of PII consistent with international laws; coordinate with India to monitor internal systems; reach out to UN Financial Institution.

Page 8: Financial Institution Cybercrime Powerpoint

Scenario 4: The Indian Central Depository has sustained a DDOS. The E-commerce Giant's web-portal has been successfully poisoned. All visitors for the past week have been infected with a rootkit which spreads itself via the networks it infects. At the UN Security Council--The USA has issued an ultimatum to the Chinese to stop hacking.

Page 9: Financial Institution Cybercrime Powerpoint

PR – Offer macro level loans to India at low interest rates; extend loans to UN countries for the potential UN actions;  draft a letter of confidence to all customers outlining current actions being taken from a financial and IT related stance to ensure customer confidence; issue severe warning to US and China over persistence of hostilities.

CISO - Conduct periodic vulnerability assessment; analyze the logs of the various systems for initiating preventive measures; create security awareness among the organization staff and stake holders; implement stateful inspections.

CIO - Isolate the e-commerce access to the system; verify that the Indian Central Depository has only sustained a DDOS; build a non-cloud networking option.

CFO - Verify existing cyber-insurance policy; examine the business model, policies, and procedures, in addition to scanning the systems and increase vigilance over all 12 levels of layered security; meet with key stakeholders; look to unaffected markets.

Legal - Review the contracts with business partners and agreements with customers; ensure our trade secrets and confidentiality of our  information is protected from cyber hackers, especially the Chinese; assure contracts include cyber data breach liability limitations.

Page 10: Financial Institution Cybercrime Powerpoint

Scenario 5: An Eastern European cyber crew Scenario 5: An Eastern European cyber crew backdoors all major media outlets and rootkits backdoors all major media outlets and rootkits all users who traverse those sites. The electrical all users who traverse those sites. The electrical grid in California, NY and New Delhi are grid in California, NY and New Delhi are knocked offline causing the generators to knocked offline causing the generators to overheat and explode. **** Major cloud overheat and explode. **** Major cloud providers corrupted by Pakistan ****providers corrupted by Pakistan ****

Page 11: Financial Institution Cybercrime Powerpoint

PR - Public statement - company’s internal infrastructure not been affected by latest attack, our assets are secure, and that we are reaping the benefits of our vigilance and recovery operations; potentially halt financial transactions of unscrupulous actors through long term divestment operations; reject China/US choice as false dichotomy and choose to freeze all US/China accounts until further notice.

CISO – Ensure all 12 Layers of security are functioning; conduct training of the personnel on a regular basis; update the existing security programs.

CIO – Monitor rootkits and computers; if found financial computers effected, every effort will be made to patch and halt the spread of the infection; records should be looked through to ensure no data was altered; isolate Pakistan’s access to the system and convert to our backup non-cloud.

CFO - Assess all financial records and archives; meet with legal counsel; expand budget to procure additional back up hardware and networking systems that can store all previous financial data without threat of interruption.; assess liquidity to determine if additional funding is available to provide macro and micro loans to restore functionality in Indian electric grids.

Legal – Ensure cyber liabilities in place and that our third party continuity operations will continue functioning as normal; review contracts with Indian utility companies to get them the finances as quickly as possible, meet with CFO.