Virtual Cyber & Technology Risk Management Forum

This is the student handbook for the September 22-24, 2020 Cyber & Technology Risk Management Forum held virtually.

Virtual Cyber & Technology Risk Management Forum

September 22-24, 2020

Virtual Cyber & Technology Risk Management Forum September 22-24, 2020

September 22, 2020

1:00 PM-2:00 PM ET

Cyber Threat Landscape

Ray Roach-Vaden Supervisory Special Agent Major Cyber Crimes Unit - Federal Bureau of Investigation

2:00 PM-2:15 PM ET

Break

2:15 PM-3:15 PM ET

.BANK Cybersecurity - The Cybersecurity & Digital Banking Benefits of .BANK

Ed Gross VP Endorsed Solutions American Bankers Association Andrew Schiff Director of Engagement fTLD Craig Schwartz Managing Director fTLD

3:15 PM-3:30 PM ET

Break

3:30 PM-4:30 PM ET

Federal Update - FDIC

Sylvia Burns Chief Information Officer, Chief Privacy Officer & Director, DIT Federal Deposit Insurance Corporation Russell Pittman Senior Special Advisor to the CIO Federal Deposit Insurance Corporation Nathan Zee Special Assistant Federal Deposit Insurance Corporation

Cyber & Technology Risk Management Forum Virtual September 22-24, 2020

September 23, 2020

1:00 PM-2:00 PM ET

What Should Vendor Management Look Like in 2020

Chad Knutson President, CISO & Partner SBS Cybersecurity

2:00 PM-2:15 PM ET

Break

2:15 PM-3:15 PM ET

Federal Reserve – Exam Tool Modernization and Supervision Central

Katie Chaney SRM Manager, Supervision & Risk Management Federal Reserve Bank of Kansas City Michael Combs Assistant Vice President Federal Reserve Bank of Kansas City Brent Richards Assistant Director, Supervision and Regulation Federal Reserve Board

3:15 PM-3:30 PM ET

Break

3:30 PM-4:30 PM ET

Ransomware – Lessons Learned & Toolkit

Holly Chase Director of Cybersecurity / IT / Fintech Massachusetts Division of Banks Phillip Hinkle Director of IT Security Examinations Texas Department of Banking Mary Beth Quist Senior Vice President, Supervisory Processes Conference of State Bank Supervisors

Cyber & Technology Risk Management Forum Virtual September 22-24, 2020

September 24, 2020

1:00 PM-2:00 PM ET

State IT Supervision

Mary Beth Quist Senior Vice President, Supervisory Processes Conference of State Bank Supervisors

2:00 PM-2:15 PM ET

Break

2:15 PM-3:15 PM ET

Incident Response/Cyber Resilience

Jon Waldman Executive Vice President, IS Consulting and Co-Founder SBS CyberSecurity

3:15 PM-3:30 PM ET

Break

3:30 PM-4:30 PM ET

Lessons Learned in Offsite Supervision

Zach Ball Examination Manager, Office of Banking Michigan Department of Insurance and Financial Services Mike Fabry

Agency Chief Information Technology Officer Nebraska Department of Banking & Finance Brad Johnson District Manager Kentucky Department of Financial Institutions Danny Ragan Information Technology Director Louisiana Office of Financial Institutions

.BANK Cybersecurity The Cybersecurity & Digital Banking Benefits of .BANK

2

Speaking Today Drew Schiff Director of Engagement fTLD Registry Services | .BANK drew@ftld.com | 202.589.2528

3

.BANK is an industry led cybersecurity initiative: Providing banks with security against BEC, phishing & spoofing attacks, and preparing their online platforms for the digital banking movement.

fTLD’s Role as Registry Operator

4

 Operates .BANK in accordance to our contract with our ‘regulator’ ICANN  Develops Policies for .BANK (eligibility, naming, etc.)  Establishes & Monitors Security Requirements for entities operating within .BANK  Verifies new requests for .BANK domains , and performs annual reverifications for existing registrants  Educates the banking industry and guides banks through their .BANK migrations

Why was .BANK Created?

5

 The Problem: Financial Institutions are most phished organizations - PhishLabs  The Magnitude: Phishing led to 92.4% of all breaches last year – FBI  It’s about Authentication : 90% of breaches & 98% of phishing emails are human error, pure social engineering , containing no malicious links or attachments -Kaspersky Lab & PhishLabs  Banks need a space online that addresses the authentication problem (like .gov & .edu) to protect against these malicious attacks that lead to breaches, identity theft and financial fraud

.BANK {Monitored} Security Requirements Typically 2-3 hours of Engineering time and about $1,000 to complete

6

1. Ensure authoritative name server host names are within the .BANK zone 2. Implement Domain Name System Security Extensions (DNSSEC) 3. Obtain a Digital Identity Certificate (TLS) 4. Ensure Transport Layer Security (TLS) has been implemented using version 1.2 or greater where possible 5. Email Authentication: Create a Domain-based Message Authentication, Reporting, and Conformance record (DMARC) and Sender Policy Framework (SPF) and/or DomainKeys Identified Mail (DKIM) records 6. Ensure vendors utilizing DNS resource records are currently using DNSSEC (#2) and TLS (#4) as required

How .BANK Addresses Domain Security

7

 .BANK’s Verification Process ensures there are no bad actors in the .BANK space  .BANK’s monitored Email Authentication requirement ensures that bad actors can’t spoof your domain from a non .BANK domain  “.BANK” at the end of a domain provides immediate authentication, validating the email(s) and website(s) are legitimate  fTLD requires 2-factor authentication to modify domain information  fTLD requires DNSSEC  fTLD verifies domain contact information at least annually  fTLD monitors domains that are at risk of being non-renewed  fTLD enables ‘role name’ and ‘role email addresses’ to protect privacy in Whois  fTLD provides Registry Lock through registrars  fTLD has placed both .BANK & .INSURANCE on the HSTS preload list ensuring all .BANK sites load exclusively with HTTPS

COVID-19 Scams Benefit From

8

 COVID thematic subject lines for phishing related to ‘PPP loans’, ‘U.S. Government Stimulus Payments’, ‘Mainstreet Lending Program’, ‘Small Business Loans’, ‘Relief Funds’ and other personal/business financial needs  Remote workers that aren’t necessarily practicing the same level of cybersecurity hygiene  Email communication replacing face-to-face communication that occurs in offices  Significantly higher volume of customer email with greater urgency as customers do genuinely need help  Executives , and other employees not accustomed to answering customer emails ‘ pitching in ’  Customer anxiety around business & personal finances

The Impact of COVID-19 on Banks  More Cyberattacks: Bad actors have taken advantage of the chaos created by remote workers, emails replacing face-to-face interactions, and customer anxiety around finances to drastically increase their phishing and spoofing attacks on banks and bank customers (over 400% according to the FBI)  Transition to Online & Digital Banking: Bank Customers have had to quickly adjust to online banking and digital communication with their banks  Changes will last: More than 25% of consumers don’t plan to return to branches even once it’s safe to do so. New exposure to, and reliance on, online banking and communications has eased concerns around, and increased interest in, online and digital banking going forward  It’s more important than ever that banks secure themselves, and their customers, against these cyberattacks , and prepare their platforms for the likely permanent increase in online & digital banking

9

The Good News  .BANK protects against the most pervasive and dangerous cybersecurity attacks banks have been facing for decades  .BANK provides industry leading domain security  .BANK domains authenticate bank websites and emails so customers can easily recognize and trust online interactions  .BANK authentication and trust prepares banks for escalated online banking today, and the addition of digital products and services to enhance relationships and attract new customers  fTLD guides banks through an affordable [~$1,000] transition to .BANK that is easy [2-3hrs of engineering] for banks and seamless for customers [no disruption, no change to behavior]  .BANK works with all other bank cybersecurity tools

10

11

Q&A Moderator: Ed Gross, VP Endorsed Solutions, ABA Craig Schwartz, Managing Director, fTLD Drew Schiff, Director of Engagement, fTLD

Resources  Book a .BANK Migration Consultation: go.ftld.com/meetings/drew89  Learn More About .BANK: www.register.bank/learn  Get a .BANK Domain: www.register.bank/get-started  .BANK Security Requirements: www.register.bank/securityrequirements  .BANK Migration Timeline: www.register.bank/timeline  .BANK Customer FAQ: www.register.bank/customerfaq  Customer Communications Guide: www.register.bank/communications  Drew Schiff: drew@fTLD.com | +1 202 589 2528 12

#$ ! )!*-( /$*) !!$ -Ѷ #$ ! -$1 4 !!$ - о $- /*-Ѷ $1$.$*) *! )!*-( /$*) #)*'*"4

* -) ++-* #ѷ *+/$)" (* -) / #)*'*"4 ( ) " ( )/ ++-* # . $) '0 $)" "$' Ѷ 1 +.Ѷ ) -* 0 / *-$ )/ /$*)ѵ • *-" )$5$)" /# ѷ (+-*1$)" #*2 2 *+ - / ѵ # - *-" )$5 /$*)ѷ • '$"). 0.$) .. !0) /$*). *! Ѷ • + / . *0- *+ - /$)" (* 'Ѷ ) • - '' '. .4./ (. 1 '*+( )/ '$! 4 ' ѵ • '*0 /- / "4ѷ ) - .$)" '*0 *+/$*) Ҋ - /$)" '*0 )/ - *! 3 '' ) ѵ • *2Ҋ * ҝ *Ҋ * 1 '*+( )/ ѷ $)$($5 . 1 '*+( )/ ) $(+-*1 *).$./ ) 4 ) . 0-$/4ѵ • * -)$5$)"Ѷ .0++*-/$)" - (*/ 2*-& ) $(+-*1$)" .. /* / ѷ * -)$5$)" *0- ++'$ /$*) ) $)!- ./-0 /0- ) .0++*-/$)" - (*/ 2*-&!*- ) - (*/ 3 (.ѵ &$)" / (*- - $'4 1 $' ' /* /# +0 '$ ѵ

с

• # /- ).$/$*) /* ( ) /*-4 / ' 2*-& $) - # спсп 2 . ! $-'4 . (' .. 0 /* $)1 ./( )/. $) (* -)$5$)" *0- $)!- ./-0 /0- • - . *! !* 0. !*- (* -)$5 /$*) $) '0 ѷ • )/ -+-$. )/$/4 ) " ( )/ җ Ҙ • * -)$5 /$*) Ҋ ' /-*)$ $' 3 # )" җ Ҙ • 3 ($) /$*) **' 0$/ җ Ҙ • ' /-*)$ $") /0- • -)$)" #)*'*"4 * -)$5 /$*) • ) $Ҋ $ .$") • 0 '$ Ҋ! $)" )/ -) / ++'$ /$*).

т

)/ -+-$. )/$/4 ) " ( )/ җ

Ҙ

• ) '45 + -!*-( ) $..0 . ) $ )/$!$ - . *! $(+-*1 ( )/ • *-&$)" *) $(+' ( )/$)" $(+-*1 ( )/. • )/ -$( .*'0/$*) $) '0 . *+/$($5$)" . 0-$/4 . ))$)"Ѷ ) +*$)/ . //$)". ) ++'$ /$*) - #$/ /0- • *-&$)" 2$/# + -/) -. *) 1 '0 /$)" ) $(+' ( )/$)" '*0 . .*'0/$*) • * -)$5 /$*) • 1 '*+$)" /# '0 +-$)/ ) -* ( + 2$/# !0/0- ./ / 1$.$*) '*)" 2$/# 0-- )/ ./ / 1 '$ /$*) • ++$)" *! 0.$) .. + $'$/$ . /* / #)*'*"4 .*'0/$*).Ѷ +# . +'*4( )/ -* ( + • ' /-*)$ $' 3 # )" җ Ҙ • (+-*1 + -!*-( ) ) - .$'$ ) 4 • # 0'4 - ' . ѷ • /# $'$/4 /* 0+'* 0 $* ) 1$ * !$' .Ѷ • +*+Ҋ0+ )*/$!$ /$*). 0. -. /* .#*2 + -.*) ' *)) /$1$/4 $..0 .Ѷ ) • /# $'$/4 /* ( $)/ $) / ! . !-*( */# - .4./ (. 1 ) 2# ) /#*. .4./ (. - 0) 1 $' ' .0 # . )& $)

у

3 ($) /$*) **' 0$/ җ Ҙ •

)# ) ( )/. - 0) -2 4 /* ! $'$/ / .. / - 1$ 2 ) - +*-/ +- + - /$*) /$1$/$ . 0-$)" 3 ($) /$*). • (+' ( )/$)" 1$ ' 2*- +-* ..$)" !0) /$*) '$/4 2$'' +-*1$ 3 ($) -. ) . ) " -. /# $'$/4 /* - 1$ 2 /# +*-/. *! 3 ($) /$*) җ .Ҙ ) ( & # )" . (*- !!$ $ )/'4 • ' /-*)$ $") /0- • .$)" ' /-*)$ .$") /0- . - /# - /# ) /- $/$*) ' .$") /0- .ѵ • 3/ -) ' . -1$ 0. /* +-*1$ + $'$/4 !*- 0.$) .. . ) $) $1$ 0 '. /# / *)ҁ/ # 1 /# $- *2) -/$!$ / . • -)$)" #)*'*"4 * -)$5 /$*) • -* 0-$)" ) 2 .4./ ( !*- $)/ -) ' ) 3/ -) ' 0. -. /* .. /- $)$)" !-*( )4 '* /$*)Ѷ / )4 /$( • *-+*- / )$1 -.$/4 җ Ҙ 1$-/0 '$5$)" *0-. *)/ )/ 0-$)" • ) $Ҋ $ .$") • (+-*1$)" *)) /$1$/4 ) '*0 *)) /$*). !*- - "$*) ' ) !$ ' *!!$ .

ф

• -*1$ $)" /**'. !*- 0/*( /$*) Ҋ $1 +0 '$ ''4Ҋ 1 $' ' ++'$ /$*) +-*"- (($)" $)/ -! . җ .Ҙ 1 $' ' *) ѵ"*1 2$/# (*- /* *( $) спср • $) ) $ ' )./$/0/$*). • * /$*). • 1 )/. ) # )" . • ))0 ' $./*-$ ' / • )& $'0- . • (+-*1$)" *0- +0 '$ ! $)" ++'$ /$*).Ҋ * 0. *) $(+-*1$)" *0- 3$./$)" ++'$ /$*). җ$ѵ ѵѶ 0. - $)/ -! .Ҙѵ 9 0) # - .$") 1 )/. ) # )" . Ҋ !*-( -'4 '' +*-/ *! /-0 /0- # )" . җ 0"0./ спспҘ ‰ * -)$5$)" )& $) җ -'4 спсрѶ / 1 -.$*) $. 1 $' ' )*2Ҙ ‰ * -)$5$)" )./$/0/$*) $- /*-4 ) / /$./$ . *) +*.$/*-4 )./$/0/$*). җспсрҘ ‰ * -)$5$)" 0(( -4 *! +*.$/. җ -'4 спссҘ

х

0.$) .. -* ' ( ѷ “Institution personnel currently have to authenticate to regulator file exchange systems in different ways, e.g., bankers may have multiple ‘tokens,’ user names/passwords, websites, and processes.”

# ( ( -. *! /# *((*) #)*'*"4 *-&$)" -*0+ җ

Ҙ ./ '$.# 0) - /#

-

*'' *- /$)" /* / -($) 2# /# - /#$. *) -) ) %*$)/'4 - .. ѵ ( -. &)*2' " /# / # " ) 4 $. ./0 4$)" *+/$*). !*- )# ) 0/# )/$ /$*) / #)*'*"4ѵ

/$*) ѷ / -($) 2# /# - *((*) 0/# )/$ /$*) .*'0/$*) $. ! .$ '

*(+' / ѷ

-& / - . - # ) $)$/$ ' - ,0$- ( )/. / -($) /$*)

ц

. "- /* .# -$)" &)*2' " Ѷ * Ѷ + $'$/$ .Ѷ / ѵ /* /# ( 3$(0( 3/ )/ /* # '+ # */# - ) +-*(*/ ./ ) - $5 /$*) • ) (* -)$5$)" /# $- .0+ -1$.*-4 .4./ (. җ$) ++$ )Ҙ • $. (* -)$5$)" $/. .0+ -1$.$*) .4./ (. !*- *(+'$ ) Ѷ ) . ! /4 ) .*0) ) .. җ$) ++$ )Ҙѵ '.* +' ))$)" !*- /# !0/0- 3 ($) - **' 0$/ • ) 0"0./ тѶ спспѶ /# - ' . -1 (*)./- / 0+ -1$.$*) )/- ' /* /# . ) *++*-/0)$/4 !*- / #)*'*"4 .# -$)" • +/ ( - сш $)/ - " ) 4 ( /$)" /* .# - 0-- )/ ) +' )) +-*% /. 0.$)" /# ++$ ) +' /!*-(

ч

!**/ - $/ш

How Banks Can Use Vendor Management Programs to Help You Make Better Decisions What Should Vendor Management Look Like in 2020

Presented By: Chad Knutson SBS CyberSecurity, LLC

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

1

Contact Information

Chad Knutson o President, CISO, Partner o CISA, CRISC, CISSP o Master’s of Information Assurance o Phone: 605-480-3366 o chad@sbscyber.com o www.sbscyber.com SBS Institute o sbsinstitute@sbscyber.com o 605-269-0909

Follow us on Social:

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

2

What does the most recent guidance say? Vendor Management Regulation

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

3

The Guidance

• FFIEC Guidance : o Outsourcing Technology Services booklet (2004) o Supervision of Technology Service Providers booklet (2012) o Outsourced Cloud Computing (2012) o BCP: Appendix J (2015) o Cybersecurity Assessment Tool (2015) – Domain 4 • FDIC Guidance : o FIL 44-2008: Guidance for Managing Third Party Risk o InTREx: https://www.fdic.gov/news/financial-institution- letters/2016/fil16043a.pdf • OCC Guidance : o OCC Bulletin 2013-29: Third-Party Relationships: Risk Management Guidance o OCC Bulletin 2017-7: Supplemental Exam procedures to 2013-29 • Federal Reserve Guidance : o SR 13-19 / CA 13-21: Guidance on Managing Outsourcing Risk

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

4

FDIC FIL-44-2008

• Four basic elements o Risk Assessment o Due Diligence in Selecting a Third Party o Contract Structuring and Review o Oversight

http://www.fdic.gov/news/news/financial/2008/fil08044a.html

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

5

FFIEC Cybersecurity Assessment Tool

• Vendor Management is all over the FFIEC CAT • Inherent Risk Profile o Six (6) questions (of 39) mention Third Parties, including identifying the number of vendors that have access to internal systems, as well as hosted ATMs, cards (debit, credit, and prepaid), ACH origination, and Trust • Cybersecurity Maturity o “Third Party” listed 33 times total, “vendor” another four (4) times o Domain 4: External Dependency Management (all about 3PM) ƒ Assessment Factors include: Connections, Due Diligence, Contracts, and Ongoing Monitoring

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

6

InTREx Management #6

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

7

InTREx Procedure #12

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

8

InTREx Procedure #12

SBS Checklist: Download Link

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

9

Compliance-Based Vendor Management

What does traditional, old-school Vendor Management look like, and what are its downfalls?

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

10

• What does regulation require us to do? o Vendor Risk Assessment o Vendor Selection o Contract Review o Due Diligence o Review Critical Vendors Going Forward • Documentation to review: Compliance-based VM o Contracts o Financials o BCM/IRP documentation o SLAs o Audit/Testing results o Determine if the vendor is a foreign service provider o Determine if the vendor uses subcontractors o Determine how you might terminate the relationship

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

11

• No real guidance on HOW to risk-assess vendors • No guidance on how to CATEGORIZE vendors • Most documentation is just gathered, not truly analyzed • Vendors are reviewed inconsistently throughout organizations • Vendor risk is not MEASURED • If you’re not measuring risk, there’s no way to tell when a vendor is not living up to your standards • Typically no process for handling risk exceptions Downsides to Compliance-Based VM

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

12

Is Vendor Management Effective?

• Would standard vendor management processes catch issues with your vendors before they happen? • Would your vendor review identify vulnerabilities in your web apps? o SOC Reports don’t include code reviews. • We know the answer… BUT!

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

13

Vendor Management should tie into your ISP and use the same risk management frameworks as other ISP areas What is a MODERN Vendor Management Program

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

14

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

15

Information Security Program Flowchart

• Vendor Risk Assessment o Your risk assessments MUST help you make better decisions 3 Major Components of VM

o Identify Vendor Risk o Identify Vendor Levels

• Vendor Selection

o Based on Vendor Level o Contract Review o Due Diligence o Metrics • Ongoing Vendor Management o Based on Vendor Level o Contract Review o Due Diligence o Metrics

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

16

Risk Management Hierarchy

Strategic Risk

Organizational Risk Assessment – evaluates the risk to the organization from the highest level based on what the org has and does

Org Risk Assessment Business Process Risk Assessment (BIA)

BIA – designed to help prioritize and recover business processes; Includes other business process dependencies, Vendors, and IT Assets

Tactical Risk

Vendor Risk Assessment - looks at the criticality of Vendors and the risk of outsourcing; includes IT Assets

Vendor Risk Assessment

IT Risk Assessment – evaluates the Inherent and Residual Risk of IT Assets, threats, and controls; the deep-dive

IT Risk Assessment

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

17

Risk Assessment Components

INHERENT RISK

THREAT

VENDOR (PP)

INHERENT RISK

MITIGATING CONTROLS

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

18

• What are the decisions you want to make using the Vendor Risk Assessment? o Vendor Selection : which of these vendors do we want to do business with? o Ongoing Vendor Management : do we want to keep doing business with this vendor? • Categorizing Vendors o Not all vendors are created equal! o Difference between your Core Banking vendor and your janitorial company, right? Goals of Vendor Risk Assessment

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

19

Modern Vendor Risk Assessment Spreadsheet example – based on Inherent Risk

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

20

1. Inventory Your Vendors o Many institutions start with the Accounts Payable list o Note : not all the vendors on the Accounts Payable list need to be managed going forward 2. Determine Protection Profile (importance) 3. Identify Threats to your Institution from that vendor 4. Protection Profile x Threats = Inherent Risk 5. Determine Mitigating Controls o Contract Review Questions o Due Diligence Questions 6. Inherent Risk – Mitigating Controls = Residual Risk Where to Start with Vendor RA?

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

21

• Protection Profile (importance) score X (times) Total Threat Score = (equals) Inherent Risk • Inherent Risk = the risk of doing business with this type of vendor Inherent Risk Calculation

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

22

• NOTE: there is NO guidance, standard, or baseline for creating the # of vendor levels • Regulatory guidance states to perform ongoing management (contract review, due diligence) for “critical” vendors • SBS uses 4 Vendor Levels o Critical (Level 1) o Significant (Level 2) o Non-Essential (Level 3) o Exempt (Level 4) • https://sbscyber.com/resources/vendor-management-how-should-i- categorize-my-vendors Determine How Many Levels

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

23

Vendor Levels

INSTITUTION-WIDE CRITICAL VENDORS

01

01

80% of focus and spend

20% of vendors

02

02

SIGNIFICANT VENDORS

80% of vendors

20% of focus and spend

03

03

NON-ESSENTIAL VENDORS

04

04

EXEMPT VENDORS

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

24

Determining Vendor Levels

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

25

Why are Vendor Levels Important?

• Your Critical Vendors are critical for a reason – they’re vital to your day-to-day operations • Focus most of your time on your most important and critical vendors • The higher the Vendor Level, the more: o Questions you ask

o Documents you gather o Frequent you review o Risk mitigation you expect

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

26

Are you really managing your existing vendor risk and relationships, or are you just floating along? Ongoing Vendor Management

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

27

Ongoing Vendor Management

1. Bank adopts Third Party Management Program

4. IT Risk Assessment

5. Perform Due Diligence

Bank identifies current vendors and performs scheduled reviews.

3.Collect Data and Documents

6. Review Contract

2. Verify Vendor Risk Level • Level 1 • Level 2 • Level 3

7. Report Upstream

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

28

• Perform a Vendor Risk Assessment o Always start with the risk assessment! • Determine vendor classification • The more important/risky the vendor, the more you do to mitigate risk • Make the #1 decision: do we want to keep doing business with this vendor? o If yes – great! Move along. o If no – or if there’s more risk than you want – then what? Much of the Same as Selection

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

29

Risk Mitigation

• Risk mitigation = “The process by which an organization introduces specific measures to minimize or eliminate unacceptable risks associated with its operations.” • Inherent Risk – Mitigating Controls = Residual Risk

INHERENT RISK

MITIGATING CONTROLS

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

30

• All depends on the Level of the Vendor • The greater the Vendor Level (risk), the more documentation should be required • Don’t forget to analyze ; can’t just collect • What do you look for? RED FLAGS! • SBS Blog: “What Documentation Should You Review for a Critical Vendor?” o https://sbscyber.com/resources/what-documentation-should-you- review-for-a-critical-vendor Required Documentation

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

31

Management Requirements

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

32

Due Diligence & Contract Review

• Same questions from before – FDIC & OCC • However, you should look into some other questions to ask, rather than just focusing FDIC & OCC questions, such as: o SOC Review Questions – what is important to take away from a SOC review? o Cloud Computing Questions o Foreign-Based Service Provider Questions • Just as different documentation requirements should be set for different levels of vendor, so should the amount and types of questions. • The more critical the vendor, the deeper the dive into Contract Review and Due Diligence questions.

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

33

The Watch List

• When a vendor does not meet acceptable levels of risk (does not “pass” a vendor review), the vendor should be placed on a Watch List. • The Watch List has four (4) outcomes:

1. Accept the Risk 2. Resolve the Risk

ƒ Work with the vendor to address any issues until resolved, then remove the vendor from the Watch List 1. Find a new vendor 2. Bring the product in-house (if outsourced) for more control 3. Discontinue the product or service

3. Change the Risk

4. Transfer the Risk

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

34

Vendor Management Summary

• Not all vendors are created equal! • How do you categorize different “levels” of vendors? • Do you need to collect the same information from different vendor levels? • Is it enough to simply gather documentation from vendors? • Do you need to ask the same questions from different levels of vendors? • What are the major components of ongoing vendor management? • How do you identify your riskiest vendor? • What is the ultimate decision to make from the ongoing vendor management process?

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

35

Besides traditional Vendor Management requirements, what are some of the modern ways to manage Vendor Risk? Other Ways to Manage Vendor Risk

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

36

Models to Manage Vendor Risk

• Assessment documentation from vendors o SSAE 18, SOC, or IT Audit reports • Tools (like TRAC) • Questionnaires • Onsite Visits • Other – Security Scorecard, FICO, etc.

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

37

• SOC 1: o Controls relevant to a service organization’s internal control over financial reporting • SOC 2: o Examination of a service organization’s controls over one or more of the 5 Trusted Services Criteria • SOC 3: o SOC 2 minus the juicy stuff o It’s publicly available • Type 1: o Control effectiveness as a snapshot in time • Type 2: o Control effectiveness over a period of time SOC Audits

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

38

Questionnaires

• Create your own questionnaires! • Include things like: o Physical Security Requirements

ƒ Physical Access ƒ Physical Storage

o Data segregation o Base questionnaire from your own regulation ƒ FIL 44-2008 or OCC 2013-29 are good places to start ƒ After all, YOU are responsible for the protection of your data o Best Practices (based on vendor type or data center)

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

39

Today’s Vendor Management has numerous shortfalls. What should you do to close the gap? Other Useful Tools for Modern Vendor Management

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

40

What About Code Reviews?

• Even more importantly… • Inside Look at the issue before it becomes a software product • Has your vendor had a code review performed for the system/application you’re using? • Code Review vs Web Application Assessment • OWASP – Open Web Application Security Project o https://www.owasp.org/index.php/Main_Page o THE standard for online web application security • In our experience, most orgs do NOT have their web apps tested against OWASP standards.

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

41

Outside looking in information. • UpGuard o https://www.upguard.com/product/vendorrisk • SecurityScorecard o https://securityscorecard.com • BitSight o https://www.bitsight.com/ • FICO Cyber Risk Score o https://www.fico.com/en/products/cyber-risk-score • CAVEAT: these are newer technologies, and there are assumptions made in many of these scores. Don’t treat them as gospel, but they are a good resource New Tools to Check Vendor Risk

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

42

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

43

Web Applications

Deeper Views

Contract for your own assessment: • Web Application Assessment • Penetration Test

Request: • Their Technical Reports

• Source Code Audit Reports • Social Engineering Results???

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

44

Supply Chain

• Identify: o High Availability Vendors o High Confidentiality Vendors • Resiliency o Identify Single Points of Failure o Build Alternative Solutions o Document Manual Procedures o Business Continuity Management Plan • Confidentiality o Vendor Management Program o Incident Response Plan

Internet

Server Datacenter

Internet Banking

Bank

Desktops

Firewall

Power

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

45

FFIEC Information Security

II.C.14 Supply Chain The typical institution purchases a wide variety of hardware and software, which often is manufactured or developed internationally. In a supply chain attack, a threat source incorporates unidentified and harmful features into the purchased items before delivery. During the risk identification process, management should identify factors that may increase risk from supply chain attacks and respond with appropriate risk mitigations. An effective information security program seeks to limit the potential for harm through techniques tailored to specific acquisitions and services. Examples of techniques to mitigate the risk from such attacks include the following: • Only making purchases through reputable sellers who demonstrate an ability to control their own supply chains. • Purchasing hardware and software through third parties to shield the institution’s identity. • Reviewing hardware for anomalies. • Using automated software testing and code reviews for software. • Regularly reviewing the reliability of software and hardware items purchased through activity monitoring and evaluations by user groups.

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

46

Third Party vs. Fourth Party

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

47

Outsourced Vendor Risks

Hosted Systems • Need to use local admin • Must use out of data Java version (or Java extensions) • Teller application sending cleartext passwords • Shared/default passwords on databases at multiple institutions • Requires use of outdate browsers (yes Internet Explorer) • Limits on password length and certain special characters • … Now move it to an outsourced environment…

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

48

• 4,918 community bank charters as of Q2 2020 • How many banks are hosted in your outsourced datacenter • What are the impacts of that datacenter failing? • How do we know if there is good security? Large Scale Impacts

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

49

Finastra Ransomware/Data Breach

• Friday, March 20, 2020 Finastra notified its customers of a security incident that is currently impacting its customers. o 4.5% of the core processor market - #5 global core banking provider • Services were down through the weekend, leaving most of Finastra’s North American customers unable to provide services to their clients • Brian Krebs: “their response so far is straight out of the playbook for dealing with ransomware attacks.” • ZDNet and threat intelligence firm Bad Packets: o Research has shown that Finastra's internet-facing security measures were lacking. o Finastra had been running vulnerable Pulse VPN servers and outdated Citrix servers recently.

© 2020 SBS CyberSecurity, LLC www.sbscyber.com

50

Confidential – Not for Public Distribution

Federal Reserve System Supervision & Regulation (S&R) Examination Tool Modernization and Supervision Conference of State Banking Supervisors Cyber and Technology Risk Management Forum September 23, 2020 – 2:15 p.m. ET

Brent Richards Assistant Director & CIO Federal Reserve Board

Michael Combs Assistant Vice President Federal Reserve Bank of Kansas City

Katie Chaney SRM Manager Federal Reserve Bank of Kansas City

Confidential – Not for Public Distribution

Agenda

1

S&R Technology Vision, Strategic Themes and Strategic Initiatives

Brent Richards

2

Community and Regional Business Strategies for IT Coming Soon: Supervision Central Interagency IT: High Priority Initiative

Michael Combs

3

Demonstration of

Supervision Central

Katie Chaney

2

Confidential – Not for Public Distribution

S&R Technology Vision

• Simplify our environment • Increase interagency sharing and interoperability • Leverage new technologies • Optimize our spend

Board of Governors of the Federal Reserve System

3

Confidential – Not for Public Distribution

Key Strategic Themes

• FOSTER EXPERIMENTATION, INNOVATION AND DISRUPTIVE THINKING We identify, evaluate and deploy new and emerging technologies to enable business strategies by empowering teams to elevate ideas, test them, and then evaluate their potential value to the S&R Division and/or Function. • TRANSITION END Ͳ TO Ͳ END BUSINESS PROCESSES FROM AGGREGATED POINT SOLUTIONS TO INTEGRATED PLATFORMS We improve user experience, minimize data silos, eliminate unnecessary cost/complexity, and reduce time to market by effectively leveraging integrated platforms to support end Ͳ to Ͳ end business processes instead of aggregating multiple independent point solutions. • BUY VS. BUILD / CLOUD FIRST We bring “best in class” industry and market leading platforms to S&R through robust buy vs. build analysis, market research, proactive exploration and provisioning. Our default position is to acquire commercial cloud Ͳ based platforms, limiting point solutions and/or custom development to only those scenarios where it is absolutely required. • MAXIMIZE THE VALUE OF ENTERPRISE INVESTMENTS We actively engage with Board and System IT to ensure enterprise investments are proactively established and can be fully and effectively leveraged by S&R. • RISK Ͳ BASED SECURITY We deploy the most appropriate information security protections and design security to avoid unnecessary complexity, reflect transparency of risk decisions, and support frictionless (positive end user experience) integrated security.

Board of Governors of the Federal Reserve System

4

Confidential – Not for Public Distribution

Key Strategic Initiatives

• ELECTRONIC FILING (M&A) – Production Go Ͳ Live 10/21 • ENTERPRISE INFORMATION MANAGEMENT (EIM) – RFP in works • END Ͳ TO Ͳ END EXAMINATION PLATFORM (GT100) Ͳ RFI underway; RFP planned for released 7/20 • SUPERVISION CENTRAL (LT100) – Production Go Ͳ Live 03/21 • LOGON.GOV (FFIEC) – Market Assessment Complete; Implementation Plan will be presented to FFIEC 09/20 • CROWDSOURCING (BOARD S&R) – Production Go Ͳ Live Q4/20 • PORTFOLIO, PROGRAM AND PROJECT MANAGEMENT PLATFORM (BOARD S&R) – Production Go Ͳ Live Q1/21 • OFFICE 365/MICROSOFT TEAMS (BOARD AND SYSTEM S&R) – Board Production Go Ͳ Live Q1/21

Board of Governors of the Federal Reserve System

5

Confidential – Not for Public Distribution

Executing the Supervisory Process

Board Policy is calibrated to support risk Ͳ focused supervision and the efficient use of scarce examiner resources.

Policy

Business Processes are consistent across Districts, eliminate inefficient and redundant activities and focused on supervisory areas of highest risk. (12 Ͳ to Ͳ 1)

Process

6 Technology Platform supports consistent processes and policy execution to achieve business outcomes.

Platform

6

Confidential – Not for Public Distribution

RBO and CBO Supervision Vision

Agencies

Bankers

Supervision Central

Supervisory Planning

Supervisory Events

Ongoing Supervision

Scheduling >> Scoping >> Data Intake >> eWorkprograms >> Vetting >> Automated Report >> Issues The “Online Exam”

7

Confidential – Not for Public Distribution

Supervision Central: The Business Case

The Business Problems…

Community, Regional and Consumer examiners noted ongoing technology gaps and pain points when collaborating with external stakeholders. Business opportunities included: 9 Improve data exchange with supervised organizations and reduce regulatory burden. 9 Better share supervisory information externally with other agencies 9 Eliminate file size limits

The Business Case… Desired Outcomes

Improve Collaboration Capabilities with Other Agencies

Reduce Regulatory Burden and Compliance Costs for the Banking Public Improve the Efficiency and Effectiveness of Related Supervision Processes

Drive Down the Cost of Community and Regional Bank Supervision Simplify the Technology Landscape for Examiners and Staff

1

2

3

Manage Data to Enable and Support Business Analytics and Decision Ͳ Making

4

6

5

8

Confidential – Not for Public Distribution

Business Features / Roadmap

Supervision Central Foundational Product Community – Regional – Consumer

Future Phases

Artificial Intelligence

Supervisory Events

Continuous Monitoring

Ad Hoc

Office 365 Experience

Document Intake and Organization

External Sharing & Collaboration

Authentication & Authorization

Evaluation of Low Code

Record Retention & Archival

Optimize E2E

Advanced Search

Approval Workflow

Backlog for Prioritization

Replacing: CBO ExamSpace RBO ExamSpace RBO TeamSites CA ExamSpace Intralinks

9

Confidential – Not for Public Distribution

Transforming Business and IT

• It has helped business leaders imagine the possibilities of cloud and a better collaboration experience with external partners, even if it means storing CSI and PII data off premises. • It has also solidified the business vision of connecting data and end Ͳ to Ͳ end processes whenever it is needed without tool hopping. • It has helped technology staff push forward with brand new cloud architectural design patterns for external authentication, cloud hosting and integration to core Fed data. • It has helped the records community consider a different way of managing information in the cloud through its retention period. It will likely change how S&R manages documents overall. • It has helped information security staff move away from BISP, being the first cloud Ͳ based system in S&R to move to SAFR. Supervision Central is an early Ͳ adopter of cloud services in S&R and is introducing substantial change:

10

Confidential – Not for Public Distribution

Interagency IT: High Priority Initiative

• The legacy technology used by agencies today is complex and will be nearing end Ͳ of Ͳ life over the next few years. Cloud Ͳ based capabilities, low code platforms and artificial intelligence provide the opportunity for transformational business and technology change. • The Fed has a strong vision for technology and the FDIC and CSBS are looking for active partnerships that could help propel these strategies further than if the Fed were to go it alone • The business case for using shared technology is aspirational and represents a multi Ͳ year strategy. It would require executive Ͳ level commitment from the Fed, FDIC and CSBS. An appropriate implementation strategy would be to start small, fail quickly and deliver value incrementally in alignment with a long Ͳ term vision.

Themes

• Historically, reaching agreement on interagency technology has been challenging and resulted in sub Ͳ optimal tools. • Managing expectations will be difficult (we can’t boil the ocean). • Agency processes and legacy technology are ingrained and would be difficult to unwind. • Long runway needed to achieve business outcomes – multiyear vision

1. Deploy Supervision Central for interagency use on joint events in 2021. 2. Evaluate CBO activities that could benefit from common technology tools across agencies (80%) 3. Investigate options and develop a business case for new technology investments across agencies. 4. Determine executive support from the Fed, FDIC and CSBS for the business case and set direction.

Scope

11

Challenges

11

Confidential – Not for Public Distribution

Interagency IT: High Priority Initiative

Objective: To further enhance the Fed’s CBO supervision by improving shared technology across agencies.

IT Guiding Principles

Interagency collaboration is governed by business need • “Business First” • Focus on common processes across Agencies • Technical limits don’t drive solutions Interagency collaboration is mindful of information security • Rigorous information security standards • Shared technology creates new risk • Reliance on InfoSec experts Interagency collaboration is inclusive • More open sharing across Agencies • Cognizant of Agencies’ varying roles and responsibilities • Solution Ͳ based mindset Interagency collaboration is innovative • Innovative, optimal solution to replace the complex legacy technology • Transformational business and technology changes • Cloud Ͳ based capabilities, low Ͳ code platforms, and artificial intelligence

1

2

3

1 2

4

12

Confidential – Not for Public Distribution

Interagency IT HPI: What’s our 80%?

Proving Our Hypothesis: CBO Supervision across the Fed, FDIC and States is similar for 80% of business processes. Interagency projects get bogged down in the 20%.

What are the shared big rocks of the supervisory process?

Ͳ Level 1 Ͳ Process

Planning

Exams

Monitoring

Ͳ Level 2 Ͳ Activities

What shared high Ͳ level activities are conducted for each process?

2. Workpapers

1. Scoping

3. Report

States

Fed

FDIC

What steps are conducted for each activity across agencies? Where are we similar (80%)?

Ͳ Level 3 Ͳ Steps

1. 2. 3. 4.

ͲͲͲͲͲͲͲͲͲͲ ͲͲͲͲͲͲͲͲͲͲ ͲͲͲͲͲͲͲͲͲͲ ͲͲͲͲͲͲͲͲͲͲ

1. 2. 3. 4. 5.

ͲͲͲͲͲͲͲͲͲͲ ͲͲͲͲͲͲͲͲͲͲ ͲͲͲͲͲͲͲͲͲͲ ͲͲͲͲͲͲͲͲͲͲ ͲͲͲͲͲͲͲͲͲͲ

1. 2. 3.

ͲͲͲͲͲͲͲͲͲͲ ͲͲͲͲͲͲͲͲͲͲ ͲͲͲͲͲͲͲͲͲͲ

13

Confidential – Not for Public Distribution

Demo

Demo of Supervision Central Katie Chaney, FRB Ͳ KC

14

14

CSBS Cyber & Tech Risk Management Forum

Incident Response and Cyber Resilience

Presented By: Jon Waldman, CISA, CRISC Partner, President of the SBS Institute, EVP of IS Consulting - SBS CyberSecurity, LLC

Contact Information

Jon Waldman o Partner, EVP IS Consulting o CISA, CRISC o Master’s of Information Assurance, Dakota State University o Mission: Help you make more informed cybersecurity decisions o Phone: 605-380-8897

Follow us on Social:

o jon@sbscyber.com o www.sbscyber.com

SBS Institute o sbsinstitute@sbscyber.com o 605-269-0909

© SBS CyberSecurity, LLC www.sbscyber.com

2

What are the new (and old) ways bad guys are getting our information and money? CURRENT THREATS

© SBS CyberSecurity, LLC www.sbscyber.com

3

What do you look like to a bad guy?

66.233.160.64

© SBS CyberSecurity, LLC www.sbscyber.com

4

It’s not some dude sitting at his hacker desk all day typing out ping commands to IP addresses via the command prompt manually… Attacks today are AUTOMATED

© SBS CyberSecurity, LLC www.sbscyber.com

5

Automated, remember?

© SBS CyberSecurity, LLC www.sbscyber.com

6

Shodan.io

© SBS CyberSecurity, LLC www.sbscyber.com

7

Ransomware Rising

• MAJOR increase in ransomware attacks in 2019 – 118% year-over-year • Insurance companies paying the ransom = higher ransoms; upwards of MILLIONS of dollars o Average Ransom Payout - $178,254 as of Q2 2020 (up 60% from Q1 2020) • Healthcare, government, transportation, and MSPs all being actively targeted • Hackers often getting in via vulnerable RDP and say undetected for months before launching a carefully crafted attack

© SBS CyberSecurity, LLC www.sbscyber.com

8

Ransomware Rising

© SBS CyberSecurity, LLC www.sbscyber.com

9

Ransomware Rising

© SBS CyberSecurity, LLC www.sbscyber.com

10

Ransomware Trends

• Ransomware = data breach – exfiltration becomes commonplace (22% vs. 30% threatening) • Top 5 Ransomware variants from Q1 2020: o Sodinokibi (REevil) – 15.4% o Maze – 7.7% o Phobos – 7.7% o Netwalker – 7.1% o Dharma – 6.4%

o https://www.coveware.com/blog/q2-2020-ransomware-marketplace-report • MEDIAN Company size of ransomware victims: 100 employees • 75% of all ransomware attacks happen to companies with <$50M in revenue • Average Downtime from Ransomware: 16 days

© SBS CyberSecurity, LLC www.sbscyber.com

11

Ransomware Tactics

Top Ransomware Vulnerabilities: • RDP or Virtual Desktop endpoints without MFA • Citrix ADC systems affected by CVE-2019-19781 • Pulse Secure VPN systems affected by CVE-2019-11510 • Microsoft SharePoint servers affected by CVE-2019-0604 • Microsoft Exchange servers affected by CVE-2020-0688 • Zoho ManageEngine systems affected by CVE-2020-10189

https://www.microsoft.com/security/blog/ 2020/04/28/ransomware-groups-continue- to-target-healthcare-critical-services-heres- how-to-reduce-risk/

© SBS CyberSecurity, LLC www.sbscyber.com

12

Password Reuse Top 25 worst passwords of 2019

© SBS CyberSecurity, LLC www.sbscyber.com

13

Modern Password Rules

• Longer = better (12 chars – user; 16 chars – admin) • Don’t reuse passwords • Still a good idea to change your password occasionally • Use a Password Manager

o LastPass o Dashlane o Keeper o KeePass o 1Password • Monitor Your Accounts Online

© SBS CyberSecurity, LLC www.sbscyber.com

14

Have I Been Pwned?

https://haveibeenpwned.com/

© SBS CyberSecurity, LLC www.sbscyber.com

15

ImmuniWeb Radar

• Free Dark Web Scan: https://www.immuniweb.com/radar/

© SBS CyberSecurity, LLC www.sbscyber.com

16

COVID-19 Cyber Threats

• Google: 18+ Million COVID-19 emails in just the last week, in addition to 240M daily COVI-19 spam messages • Phishing up 667% right now • FBI IC3: 4x complaints per day (1K before COVID-19, now 3k-4k per day) • 148% spike in ransomware attacks due to COVID-19 • 30%-40% increase in attacker interest relating to RDP (as measured by Shodan) • 26% increase in e-comm web skimming in March • Healthcare, Financial Services , Medical Suppliers and Manufacturing, Government and Media Outlets all seeing a large increase in cyber threats

© SBS CyberSecurity, LLC www.sbscyber.com

17

Where does Incident Response fit in to your Information Security Program? Defining Incident Response

© SBS CyberSecurity, LLC www.sbscyber.com

18

© SBS CyberSecurity, LLC www.sbscyber.com © SBS CyberSecurity, LLC ww .sb cyber.com

19 19

• FFIEC Information Security Booklet • Security Operations section • FFIEC Cybersecurity Assessment Tool • Domain 5 – Incident Management and Resilience • FFIEC BCM Booklet • Resilience; tying IRP to BCP • FDIC Appendix B to Part 364 • Section III Response Program Regulatory Guidance on IRP

• NIST SP 800-61 Computer Security Incident Handling Guide : • http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf • NIST SP 800-86 Guide to Integrating Forensic Techniques into Incident Response • http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf

© SBS CyberSecurity, LLC www.sbscyber.com

20

III. Security Operations (IS Booklet)

• Threat Identification and Assessment • More focused then Risk Identification Process • Monitor for hostile cyber or physical threats, human errors, structure failures, and man-made or natural disasters. • Leverage attack trees, event trees, and kill chains • Threat Monitoring • Establish responsibility and authority to monitor systems • Network, host, and application monitoring • Incident Identification and Assessment • Identify indicators of compromise and analyze events • Leverage identification systems such as: ISP, Endpoint monitors, DLP, Logs, file integrity…. • Escalate and report . • Incident Response

• Establishes when and who should enact Incident Response • Defined Process to address the threat and return to operations

© SBS CyberSecurity, LLC www.sbscyber.com

21

FFIEC CAT

DFIR!

© SBS CyberSecurity, LLC www.sbscyber.com

22

Incident Response Process

Bank

Third Party

Customer

http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf

https://www.csbs.org/sites/default/files/cybersecurity101_2019_final_with_links.pdf

© SBS CyberSecurity, LLC www.sbscyber.com

23

Made with FlippingBook Publishing Software