2021 Cyber and Technology Risk Management Forum
This FlippingBook contains the presentations from the 2021 Cyber & Technology Risk Management Forum.
2021 Cyber & Technology Risk Management Forum October 13-14 , 2021
@ www.csbs.org � @csbsnews
CONFERENCE OF STATE BANK SUPERVISORS
1129 20th Street NW / 9th Floor / Washington, DC 20036 / (202) 296-2840
2021 Cyber & Technology Risk Management Forum October 13-14, 2021| All Times Eastern Standard Virtual Meeting via Remo
Day 1 | Wednesday, October 13th
Welcome and Introduction Sebastien Monnet, CSBS
1:00PM
Presentation: Current Cybersecurity Threat Landscape Brian L. Sanders, Network Intrusion Forensic Analyst, US Secret Service
1:05PM
BREAK
2:00PM
Protecting CSBS Systems and Data for States Todd Scharf, Chief Security Information Officer, CSBS
2:15PM
BREAK
3:15PM
Cloud Webservices & Auditing Techniques Jason Claycomb, Senior Instructor, ACI Learning
3:30PM
Adjourn
4:30PM
Day 2 | Thursday, October 14th
Introduction and Day 1 Reflection Sebastien Monnet, CSBS
1:00PM
The Future of State-Federal Collaboration Mark Buethe, Supervisory Examiner Banking Supervision & Regulation, Federal Reserve Bank of St. Louis Christine Hutchinson, Senior IT Project Manager, Federal Reserve Bank of Kansas City Jonathan Trunfio, Senior Financial Institution Policy Analyst, Federal Reserve Board Angela Knight-Davis, Manager, CBS-Supervision Technology, Federal Reserve Board
1:05PM
BREAK
2:00PM
Continuous Monitoring of Cyber Vulnerabilities Charlie Moskowitz and Lou Burgess, Security Scorecard
2:15PM
BREAK
3:15PM
CSBS & State Jam Session Sebastien Monnet and Mary Beth Quist, CSBS
3:30PM
Adjourn
4:30PM
Business Electronic Compromise
U.S.Departmentof Homeland Security United States Secret Service
U.S. Secret Service Mission
Protection •President •Vice-President
Investigations •Counterfeit Currency
•Former Presidents •Foreign Dignitaries •Others as designated •Large Events
Treasury Obligations
•Financial Crimes
Identity Crime Mortgage Fraud Access Device Fraud Bank Fraud Computer Crimes Network Intrusions Internet Fraud
•Electronic Crimes
U.S.Departmentof Homeland Security United States Secret Service
Jurisdictional History 1865 - U.S. Secret Service created to fight counterfeit currency 1901 - Assigned Presidential Protection duties 1948 - Title 18 USC Section 470-474 (Counterfeiting and Forgery) 1984 - Title 18 USC Section 1029 (Access Device Fraud) 1986 - Title 18 USC Section 1030 (Computer Fraud) 1990 - Title 18 USC Section 1344 (Bank Fraud) 1996 - Title 18 USC Section 514 (Fictitious Obligations) 1998 - Title 18 USC Section 1028 (Identity Theft) 2001 - PATRIOT Act (Expanded Cyber Crime Responsibilities)
U.S.Departmentof Homeland Security United States Secret Service
USA PATRIOT ACT OF 2001 HR–3162, 107th Congress, First Session October 26, 2001 Public Law 107-56 Sec. 105 Expansion of National Electronic Crime Task Force Initiative
The Director of the United States Secret Service shall take appropriate actions to develop a national network of electronic crime task forces, based on the New York Electronic Crimes Task Force model, throughout the United States for the purpose of preventing, detecting, and investigating various forms of electronic crimes, including potential terrorist attacks against critical infrastructure and financial payment systems.
U.S.Departmentof Homeland Security United States Secret Service
Secret Service Approach to Combat Electronic Crime and Identity Theft Electronic Crimes Special Agent Program (ECSAP)
Network Intrusion Response (NITRO) Electronic Crimes Task Forces (ECTF) Financial Crimes Task Forces (FCTF)
Cyber Fraud Task Force (CFTF)
Cyber Intelligence Section (CIS) Secret Service Offices overseas Cell Phone Forensic Facility (Tulsa, OK) Computer Emergency Response Team (CERT) National Computer Forensic Institute (NCFI – Hoover, AL)
U.S.Departmentof Homeland Security United States Secret Service
Globalization of Electronic Crimes Increased involvement of organized transnational criminal groups Proceeds from these crimes are being used to fund/engage offenses including: narcotics trafficking, extortion and additional electronic crimes Threatens the U.S./Global critical and financial infrastructure Lessen our confidence in the processing of everyday business transactions
U.S.Departmentof Homeland Security United States Secret Service
Cyber Threat Landscape Number of Forums in 2002 Approx Number of Criminal Forums Today Languages Represented Internet Monikers Roles/Specializations
U.S.Departmentof Homeland Security United States Secret Service
Verizon DBIR 2019
U.S.Departmentof Homeland Security United States Secret Service
Business Email Compromise (BEC) Statistics Internet Crime Complaint Center (IC3) October 2013 – July 2019 $10 Billion + Most Common Victim Real Estate Payroll ***No Malware Needed***
U.S.Departmentof Homeland Security United States Secret Service
BEC
Employee Education Wire Transfer Policies Multi-factor authentication for wire authority Good relationships with banks Contact law enforcement ASAP if a fraudulent wire transfer has occurred
U.S.Departmentof Homeland Security United States Secret Service
BEC – Financial Fraud Killchain
FinCEN – Financial Crimes Enforcement Network (Treas) Conditions 1. Wire Must go overseas 2. Wire Must be $25,000 or more 3. Wire Must have been sent less than 72 hours prior
U.S.Departmentof Homeland Security United States Secret Service
Ransomware
U.S.Departmentof Homeland Security United States Secret Service
Ransomware Statistics/Info 50% RDP Compromise from credentials/passwords
25% Email Phishing Ransom Averages 2017 - $5,000
2019 - $288,000 2021 - $570,000 Baltimore - $18,000,000 +; New Orleans - $7,000,000 + 36% Pay the Ransom (AVG) Third Party Negotiators; Cyber Insurance (Risk Transfer)
U.S.Departmentof Homeland Security United States Secret Service
U.S.Departmentof Homeland Security United States Secret Service
Department of Treasury Announcement
October 1, 2020 – Office of Foreign Assets Control (OFAC) Bans Payments to “Sanctioned Entities” or “Embargoed Regions” Civil Penalties or Fines Mitigating Factors Report/Cooperate with Law Enforcement Prevention Training Ransom Risk Analysis in Incident Response Plan https://home.treasury.gov/system/files/126/ofac_ransomware_adviso ry_10012020_1.pdf
U.S.Departmentof Homeland Security United States Secret Service
Ransomware
Preventive Measures
Incident Response Plan/Testing Protected Back Ups Employee Awareness and Training
Approved Application List File Integrity Monitoring Block IP Addresses Network Segmentation Software Updates Scheduled AV/AM Scans Configure Access Control (Least Privilege) Disable/Configure Remote Access
U.S.Departmentof Homeland Security United States Secret Service
Ransomware
Business Continuity Back Up Data
Secure Backups Test Restoration Process Annual Penetration Testing
What To Do If Infected
Isolate Infected Computers Immediately Power Off Computers Not Yet Completely Infected Secure Backup Data Contact Law Enforcement
Ransomware Guide: https://www.cisa.gov/sites/default/files/publications/CISA_MS- ISAC_Ransomware%20Guide_S508C_.pdf
U.S.Departmentof Homeland Security United States Secret Service
Vendors/Contractors
Same Security Policy as YOUR COMPANY USES
Contracts
Service Level Agreement (SLA)
U.S.Departmentof Homeland Security United States Secret Service
IoT/BYOD*
U.S.Departmentof Homeland Security United States Secret Service
N-TEC Task Force
Email: Dallas.CFTF@usss.dhs.gov Quarterly Meetings Regular advisories and informational publications Partner with FBI, US-CERT, HSI among others
U.S.Departmentof Homeland Security United States Secret Service
Useful Online Sites
United States Secret Service / Electronic Crimes Task Force www.secretservice.gov/investigation/#field Local Field Offices www.secretservice.gov/contact/ Mitigation Department of Homeland Security United States Computer Emergency Readiness Team (US-CERT) www.us-cert.gov NIST Cybersecurity Framework http://www.nist.gov/cyberframework/
U.S.Departmentof Homeland Security United States Secret Service
Cybersecurity and Infrastructure Security Agency (CISA) cisa.gov NSA/IAD Top 10 Information Assurance Mitigations Strategies: https://www.iad.gov/ International Organization for Standardization (ISO) www.iso.org/iso/home.html National Cybersecurity and Communications Integration Center (NCCIC) www.us-cert.gov/nccic Useful Online Sites, cntd.
U.S.Departmentof Homeland Security United States Secret Service
Questions? Brian Sanders brian.l.sanders@usss.dhs.gov 214-471-7645
U.S. Department of Homeland Security United States Secret Service
CSBS Cyber Defense Practices Todd Scharf Chief Security Information Officer CSBS
Internal Use Only
CSBS Cyber Defenses Sharing Approach
Frameworks
Practices
Architecture
Questions
Frameworks
NIST CSF
Designed for managing and reducing cyber risk in critical industries, the NIST Cybersecurity Framework (CSF) is the overarching guidance CSBS uses for all systems. Organized into five key Functions – flexible and can be adapted to accommodate more prescriptive frameworks, like FISMA, CJIS, and SOC.
Frameworks FISMA & CJIS
The Federal Information Security Modernization Act (FISMA) mandates following the current version of NIST SP800 ‐ 53, currently Rev 5, for Federal Systems. FISMA is much more detailed and prescriptive than CSF and includes Privacy ‐ specific controls. It is applied by CSBS to NMLS, SES, and CRM. The Criminal Justice Information Service (CJIS) Security Policy is similar to FISMA in prescriptive controls but applies to Criminal History Record Information (CHRI) and is overseen by the FBI. CJIS is applicable to NMLS and the Background Check Automation System (BCAS) subsystem managed by Fieldprint.
Frameworks SOC for Cybersecurity
Created by the AICPA to provide a more information security risk ‐ centric assessment for organizations who were finding the SOC 1/2/3 assessments not suitable. An overall assessment of information security and risk management, focused on CSBS as an organization and not specific systems.
Flexible on Framework
Assessments & Audits
Our Practices Annual Penetration Testing
Real-time Vulnerability and Compliance Monitoring Monthly Phishing Tests with Remedial Training Annual Classification, Security, and Privacy Training Quarterly Topical Awareness Training Security Integration into Development Lifecycle CIS Benchmarks AWS Config
Multi-factor Authentication Mobile Device Management Policy Statement Library Security Reviews Every Contract
The Team
Cloud
Risk Management
Policy, Compliance & Training
Operations & Engineering
Operations & Event Monitoring
Engineering
Internal Use Only
Questions
Audit and Security for Cloud-Based Services
Risks at provider
§ Physical / environmental § Networks § Firewalls? § IDS? § Hardware maintenance – CSP (networks) ♦ What about servers § Change management § They go out of business § Change in ownership that impact controls
ACI Learning
Slide 29
ASN305011420
© INARMA, Jason Claycomb
• 29
Platform as a Service PaaS
• 30
MIS Training Institute, Inc. © INARMA, Jason Claycomb
Introduction - Page 15
ASN305011420
Audit and Security for Cloud-Based Services
Platform Overview § Platform as a Service (PaaS) is a way to rent hardware, operating systems, storage and network capacity over the Internet. The service delivery model allows the customer to rent virtualized servers and associated services for running existing applications or developing and testing new ones. (Techtarget.com) § Let internal IT focus on the business (applications). § Let service provider handle the “commodity work”.
§ Smallest market when compared to IaaS and SaaS (Gartner)
ACI Learning
Slide 31
ASN305011420
© INARMA, Jason Claycomb
• 31
Application PaaS § Application platform as a service (aPaaS) is a form of PaaS that provides a platform to support application development, deployment and execution in the cloud. It is a suite of cloud services designed to meet the prevailing application design requirements of the time, and includes mobile, cloud, the Internet of Things (IoT) and big data analytics innovations.
Gartner Magic Quadrant for Enterprise Application Platform as a Service, Worldwide, March 2015
§ APaaS is often used by tech companies
ACI Learning
Slide 32
ASN305011420
© INARMA, Jason Claycomb
• 32
MIS Training Institute, Inc. © INARMA, Jason Claycomb
Introduction - Page 16
ASN305011420
Audit and Security for Cloud-Based Services
Risks
§ Infrastructure owned by CSP § Who owns & manages the applications?
ACI Learning
Slide 33
ASN305011420
© INARMA, Jason Claycomb
• 33
SaaS Providers
• 34
MIS Training Institute, Inc. © INARMA, Jason Claycomb
Introduction - Page 17
ASN305011420
Audit and Security for Cloud-Based Services
Why SaaS?
§ "Cloud is the new style of elastically scalable, self-service computing and both internal applications and external applications will be built on this new style.” Gartner
ACI Learning
Slide 35
ASN305011420
© INARMA, Jason Claycomb
• 35
Provider Does Everything
§ Data center § Networking & all infrastructure § Servers § IT operations § Application implementation & support
§ Change management § Patch management
ACI Learning
Slide 36
ASN305011420
© INARMA, Jason Claycomb
• 36
MIS Training Institute, Inc. © INARMA, Jason Claycomb
Introduction - Page 18
ASN305011420
Audit and Security for Cloud-Based Services
User Does a Few Things
§ Configure the application § User administration
§ Use the application ;-) ♦ Input ♦ Output reconciliation
§ Perform vendor due diligence
ACI Learning
Slide 37
ASN305011420
© INARMA, Jason Claycomb
• 37
Security as a Service
• 38
MIS Training Institute, Inc. © INARMA, Jason Claycomb
Introduction - Page 19
ASN305011420
Audit and Security for Cloud-Based Services
Security as a Service § An managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems. Common services include managed firewall, intrusion detection, virtual private network, vulnerability scanning and anti-viral services. MSSPs use high-availability security operation centers (either from their own facilities or from other data center providers) to provide 24/7 services designed to reduce the number of operational security personnel an enterprise needs to hire, train and retain to maintain an acceptable security posture.
Source: Gartner
ACI Learning
Slide 39
ASN305011420
© INARMA, Jason Claycomb
• 39
CASBs
§ Cloud access security brokers (CASBs) are on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. CASBs consolidate multiple types of security policy enforcement. Example security policies include authentication, single sign-on, authorization, credential mapping, device profiling, encryption, tokenization, logging, alerting, malware detection/prevention and so on.
ACI Learning
Slide 40
ASN305011420
© INARMA, Jason Claycomb
• 40
MIS Training Institute, Inc. © INARMA, Jason Claycomb
Introduction - Page 20
ASN305011420
Audit and Security for Cloud-Based Services
Services
§ Firewall / IDS / IPS § Distributed denial of service (DDoS) protection § Secure messaging / web gateways § Data loss prevention § Security information and event management (SIEM) § Managed vulnerability scanning of networks, servers, databases or applications § Security vulnerability or threat notification services § Incident response
ACI Learning
Slide 41
ASN305011420
© INARMA, Jason Claycomb
• 41
Providers
§ IBM, Dell SecureWorks § Telecomm: Verizon, AT&T, BT § A/V vendors: Symantec, McAfee, Trend
§ NTT § CSC § Trustwave § CenturyLink
ACI Learning
Slide 42
ASN305011420
© INARMA, Jason Claycomb
• 42
MIS Training Institute, Inc. © INARMA, Jason Claycomb
Introduction - Page 21
ASN305011420
Audit and Security for Cloud-Based Services
ACI Learning
Slide 43
ASN305011420
© INARMA, Jason Claycomb
• 43
Reference Materials
§ AICPA http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLOGY/R ESOURCES/TRUSTSERVICES/Pages/default.aspx § PCI DSS Cloud Guidelines https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_Cloud_Guidelines .pdf § Cloud Security Alliance https://cloudsecurityalliance.org/ § ISO 27001 http://www.iso27001standard.com/blog/2014/10/13/how-to-define-the- isms-scope/
ACI Learning
Slide 44
ASN305011420
© INARMA, Jason Claycomb
• 44
MIS Training Institute, Inc. © INARMA, Jason Claycomb
Introduction - Page 22
ASN305011420
Audit and Security for Cloud-Based Services
Reference Materials
§ Data Centers ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers http://www.ieee802.org/3/hssg/public/nov06/diminico_01_1106.pdf
ACI Learning
Slide 45
ASN305011420
© INARMA, Jason Claycomb
• 45
MIS Training Institute, Inc. © INARMA, Jason Claycomb
Introduction - Page 23
ASN305011420
Confidential– ForInteragencyUseOnly
The Future of State-Federal Collaboration Federal Reserve System Supervision Technology
CSBS Cyber & Technology Risk Management Forum October 14, 2021 12:00 PM – 1:00 PM CT
Jonathan Trunfio Federal Reserve Board
Mark Buethe Federal Reserve Bank of St. Louis
Christine Hutchison Federal Reserve Bank of Kansas City
Angela Knight-Davis Federal Reserve Board
Confidential– ForInteragencyUseOnly
What is Supervision Central?
Foundational Product Community – Regional – Consumer
Future Phases
Supervision Central uses early-adopter cloud technology to create new intake, exchange, and collaboration capabilities that support examiners, bankers, and other agencies on examination events and ongoing supervision- continuous monitoring supporting LT100 supervision. The first release of Supervision Central focused on delivering foundational
Expanded Banker and Agency Capabilities
Supervisory Events
Continuous Monitoring
Ad Hoc
Artificial Intelligence
Document Intake and Organization
External Sharing & Collaboration
Authentication & Authorization
End-to-End Processes
Record Retention & Archival
Advanced Search
Approval W orkflow
Strategic Pivot Low Code
Office 365 Experience
capabilities, while future releases will include new functionalities and value- oriented business enhancements.
Replacing: CBO ExamSpace RBO ExamSpace RBO TeamSites CA ExamSpace Intralinks
2
Confidential– ForInteragencyUseOnly
Interagency Technology
“How can we reduce regulatory burden?”
“How can we improve examination processes and simplify the technology landscape?” “How can we improve data accessibility,sharing, and transparency?”
Business Case for a Shared Solution
Shared Interagency Objectives
“How can we improve interagency collaboration?”
“How can we reduce IT costs?”
3
Confidential– ForInteragencyUseOnly
Interagency Magic Quadrant: Commonality vs. Value
Assessing Business Value Where would shared technology relieve regulatory burden for supervised organizations and make it easier to work with other agencies on joint events? Where would shared technology improve the efficiency and effectiveness of processes for supervisory staff? Where would shared
All Other Processes
technology provide the greatest value for the largest number of stakeholders?
Assessing Commonality Hypothesis – CBO S&S supervision across the Fed, FDIC, and States is similar for 80% of business processes. Interagency efforts get bogged down in the 20% in differences. The team evaluated Processes, Activities and Steps across S&S supervision to look for commonalities. Conclusion: Basic business processes across CBO supervision are fundamentally similar. WHAT we do is common, but HOW we do it is different.
4
Interagency Alignment: Guiding Principles
Confidential– ForInteragencyUseOnly
Interagency alignment is both practical and aspirational • A single, shared platform is aspirational; however, not the only solution to achieve higher efficiency, effectiveness, and collaboration. • Technology leaders will provide business leaders guidance on potential solutions. • Parties will share best practices, leverage common coding, and strive to provide a consistent interface and experience for users.
Interagency alignment emphasizes joint decision making
• Each party is an equal partner, with ample representation during all alignment activities. • Representatives should participate in conversations to the best of their ability. Interagency alignment has a bias toward compromise
• Parties should work toward compromise whenever possible or be able to respectfully articulate clear business reasons for differences.
Quadrant 2 Processes
Technology Solution Strategy
Governance Structure
CIO Appointed workgroup to develop a recommendation for delivering shared technology, considering multiple options: • interoperable and/or interconnected systems to be used across agencies • a shared infrastructure; and • a common platform
As governance and technology solution recommendations are in process, the interagency Supervision Process Committee has initiated work to align quadrant 2 processes: Report of Exam and Issues Terminology
The business workgroup to propose an inclusive and equitable governance structure.
Current
Workstreams
5
SecurityScorecard (“SSC”) Partnership with State Regulators
HIGHLY CONFIDENTIAL
October 14, 2021
About SecurityScorecard
Mission: Make the World a Safer Place
Global leader in security ratings (investors include Fitch and Moody’s ‐ former S&P CEO is advisor)
11+ million entities currently rated (20M by end of December)
Operates one of the largest DNS malware sinkholes 700M+ hits a day, 27B vulnerabilities per week Rates (“A” through “F”) across 10 categories, such as:
● Network security ● Patching cadence ● Endpoint security ● Web app security
Overall “A” through “F” scores are correlated to breach ‐ “C” or “D” or “F” are statistically 4.3 ‐ 7.7x more likely to be breached
Scores new entities in 5 minutes or less
Multiple Regulatory/Oversight Use Cases
360 View Regulators leverage SSC’s data via an API pull for its own internal purposes, and SSC’s platform will allow regulators to privately store examiners’ notes. Historical Data With 7 years of SSC’s historical data , examiners (and investigators) can see a covered entity’s security posture over time (e.g., S S C recently conducted a data analytic investigation of a major bank after a breach for 2018 and 2019 .) Self ‐ Monitoring and Third ‐ Party Risk Management Working with regulatory agency CISOs to provide valuable data for the agency to monitor the safety of its own network and assist creation of its own third ‐ party vendor risk management program.
Cyber Intelligence Powering Regulators’ Cyber Intelligence Units with intel collection and supplementing regulators’ threat intelligence and threat hunting capability with SSC’s threat intelligence group; brief regulators on major breaches (including SolarWinds, MS Exchange, and Pulse Secure) and support regulators’ investigations teams. Exam Scoping and Risk ‐ Based Oversight S S C continuously monitors covered entities at scale with ML and AI helping regulators identify and properly scope examinations based on state cyber rules and regs. S S C allows examiners to take a risk ‐ based approach to exams and audits (i.e., start with audits/exams of ‘F’ rated companies, move on to ‘D’ rated companies, etc.), raising the fl oor on cybersecurity for the entire industry
Summary of SSC’ s Current Work with State Regulators
● Understanding that regulators cannot audit/investigate the thousands of covered entities they regulate every year, regulators use S S C to select and scope annual exams. S S C helps regulators identify entities falling behind and triage issues to focus on ● S S C ratings are used to verify accuracy of questionnaires and regulatory fi lings ● S S C can provide historical data for speci fi c research projects and analysis ● S S C maps state compliance regimes to our data to provide continuous monitoring of regulatory compliance Exams
Additional Initiatives
● Weekly meetings with regulators to address questions, discuss exam ‐ related issues, and review progress for ongoing work ‐‐ spanning exam, intelligence, and investigation ‐ related matters ● S S C has conducted periodic intelligence brie fi ngs to provide further color on its originally published research ● S S C provides trainings for audit and investigations sta ff
SSC ’ s Platform Is Highly Customized to Each Regulator’s Portfolio of Regulated Entities
Companies Grouped According to Regulator’s Preferences
All Data is Dynamic and Updated Daily
Redacte d
Redacte d
Redacted
Ability to Map state regulatory regimes To
SSC ’s 77 Findings
SSC’ s Partnership with Bank Regulators Is Responsive to Increased Attention on Greater Public/Private Information Sharing ● DHS Secretary Alejandro Mayorkas testi fi ed as follows on March 17, 2021 before the House Committee on Homeland Security: “The public/private partnership is especially important in enhancing our nation's cybersecurity.” ● On its Critical Infrastructure Partnerships and Information Sharing webpage, CISA states that “[p]ublic-private partnerships are the foundation for effective critical infrastructure security and resilience strategies, and ... is essential to the security of the nation’s critical infrastructure.”
● In a February 2021 press release, CISA announced a formal partnership with Viasat, a private company, and wrote, “[t]his partnership …further improves CISA’s support to public and private sector partners.”
2021 Cyber & Technology Risk Management Forum CSBS Jam Session
Let’s talk about training
Poll Question
All things considered, what is your agency’s biggest challenge for cyber/IT supervision? • Training availability
• Staff capability • Time limitations • Capacity
Developing the Workforce of Tomorrow
Critical areas of focus: • Cyber & IT • Data analytics • Leadership development
Cyber & IT Training
Inventory of current CSBS training resources • On ‐ demand • Live virtual • In ‐ person
Cyber & IT Training
• Development of cyber and IT examiner learning pathways • Training content gap analysis
Poll Question
All things considered, what is your preferred cyber/IT training delivery channel?
• On ‐ demand • Live virtual • In ‐ person • Blended
Cyber & IT Training
What to expect for 2022 and beyond: • IT Examiner Schools • Cyber & Technology Risk Management Forum • Day One Cyber/IT Examiner Training • Partnerships
Poll Question
In 2022 and beyond, for this CyTech event, would you prefer? • Just live virtual once a year • Just in ‐ person once a year • Live virtual in the spring, in ‐ person in the fall • None of the above. I am out!
State Supervision of Cyber and IT Areas Discussion topics: • Aligning Bank and Nonbank • What’s next? • Where is the Risk ‐ Banks vs Nonbanks • InTREX Updates Coming SOON • Ransomware Self ‐ Assessment Tool (R ‐ SAT)
Poll Question
Has your agency issued the R ‐ SAT to your supervised institutions? • Yes • No • What’s R ‐ SAT
Poll Question
Is your agency mandating completion of the R ‐ SAT for your supervised institutions?
• Yes • No • Again, what’s R ‐ SAT?
Service Provider Supervision How to get involved: 1. Agency Authority 2. Guiding Principles Document 3. Regional SPs – coordinated out of regions – FDIC/FRB/OCC 4. Significant Service Providers –coordinated out of DC Current State CPCs ‐ NY (2), MO and CA
Word Cloud
What Keeps you Up at Night on the Cyber front? Type in one word to create word cloud – you can submit up to three times
Security Scorecard • Are any of you already using?
• Could this benefit your department?
• Could this tool benefit your examinations?
Comments & Questions?
All things considered, what is your agency's biggest challenge for cvber/lT supervision?
1.4 Mentimeter
19
9
6
6
Capacity
Training availability
Staff capability
Time limitations
All things considered, what is vour preferred cvber/lT training delivery channel?
1.4 Mentimeter
On-demand
Live virtual
Blended
16
In-person
- • m
In 2022 and bevond, for thisCvTech event, would vou prefer?
l4 Mentimeter
23
18
9
0 None of
Just live virtual once a year
Just in- person once a year
Live virtual in the spri • ng,1 • n- person 1 • n the fall
the above. I am out!
- • tE
Has vour agencv issued the R-SAT to vour supervised institutions?
1.4 Mentimeter
• •• . • 6 What's R-SAT
Yes
- • m
Is vour agencv mandating completion of the R-SAT for vour supervised institutions?
1.4 Mentimeter
• 1 Again, what's R-SAT?
••• 3 Yes
- • ID
hat Keeps vou Up at Night on the Cvber
l4 Mentimeter
front?
ransome ware U"'ercomplianc
federal overr"ach
zero day exploits
human error
losing the arms race
service provider attack
support from other examin
ph1shing d t b h 0 0 reClC ransomware humanelement
+-' E 0)
e
lack of inventories data breeach c.;overage pushback supervisor support
@ §
E ,._
.Q E
0 0 ransomeware
0 \J
e
C
§
_0$ - - E (l) cato
ꞏ ꞏ d t QC ers lnCI en response
h k
financial fraud
ssphit
staff knowledge iot user access
examinerstatting bank failure board buyin
- o g e data breaches E patch management adequate time for exams vulnerabilities cybersecurity as a whole
randsomware
(/)
hacker -
_
-g (l) \J
identity theft
- •
Made with FlippingBook - Online magazine maker