SlideShare a Scribd company logo
1 of 18
11 CRITICAL AREAS OF

CYBERSECURITY FOCUS FOR
FINANCIAL INSTITUTIONS
I N T E L L I S E C P A R T N E R S P R E S E N T :
C Y B E R S E C U R I T Y R O U N D TA B L E / F E B 2 0 1 5
A G E N D A
• Cybersecurity Role in Risk
Management
• New Regulatory Guidance
• 11 Areas of Focus
• Next Steps
N Y S D E PA R T M E N T O F F I N A N C I A L S E R V I C E S :
“ T H E D E PA R T M E N T E N C O U R A G E S A L L I N S T I T U T I O N S T O
V I E W C Y B E R S E C U R I T Y A S A N I N T E G R A L A S P E C T O F T H E I R
O V E R A L L R I S K M A N A G E M E N T S T R AT E G Y, R AT H E R T H A N
S O L E LY A S A S U B S E T O F I N F O R M AT I O N T E C H N O L O G Y. ”
N E W F O C U S
• Frequency and sophistication
of cyberattacks continue to
grow
• Increased focus on
cybersecurity by Federal and
State regulators
• Cybersecurity should be a
top-of-mind strategic concern
• Potential ramifications too
serious to ignore
1 1 C R I T I C A L A R E A S O F
C Y B E R S E C U R I T Y F O C U S
1 . C O R P O R AT E G O V E R N A N C E
Tone At The Top Matters
Cybersecurity No Exception
Cybersecurity Not Just An IT Issue
2 . M A N A G E M E N T O F C Y B E R S E C U R I T Y
I S S U E S
Interaction Between Information Security & Core
Business Functions
Written Information Security Policies & Procedures
Periodic Re-Evaluation
3 . S E C U R I T Y & R I S K M A N A G E M E N T
R E S O U R C E S
The Right People
The Right Processes
The Right Technology
4 . S H A R E D I N F R A S T R U C T U R E R I S K S
Think “Least Privilege”
Segregate Critical Data
Focused Due Diligence
5 . I N T R U S I O N P R O T E C T I O N
Multi-Factor Authentication
Server & Database Configurations
Focus On Critical Data, Not Transaction Type
6 . S E C U R I T Y T E S T I N G & M O N I T O R I N G
Penetration Testing
Annual Tests May Not Longer Be Sufficient
Focus On Critical Data
7 . I N C I D E N T D E T E C T I O N A N D
R E S P O N S E
Sufficient Monitoring
Detection Of Attacks
Speed Of Response
8 . O N G O I N G T R A I N I N G
Cybersecurity Training
For All Staff
Specialized Training
9 . M A N A G E M E N T O F T H I R D - PA RT Y
S E RV I C E P R O V I D E R S
Extended Cybersecurity Boundaries
Identify Risks & Controls
Confirm “Chain Of Trust”
1 0 . B U S I N E S S C O N T I N U I T Y A N D
D I S A S T E R R E C O V E RY
Integrate With Cybersecurity
Policies & Procedures
Testing & Verification
1 1 . C Y B E R S E C U R I T Y I N S U R A N C E
Part Of Risk Control Strategy
Note Exclusions
Evaluate Periodically
N E X T S T E P S
• List not exhaustive
• Your cyber threat profile is
unique
• Thorough and proactive
evaluation of cyber risks
necessary
W E C A N H E L P
INTELLISECPARTNERS.COM
602.341.3435

More Related Content

What's hot

Small Investments, Big Returns: Three Successful Data Science Use Cases
Small Investments, Big Returns: Three Successful Data Science Use CasesSmall Investments, Big Returns: Three Successful Data Science Use Cases
Small Investments, Big Returns: Three Successful Data Science Use CasesSense Corp
 
Project Scheduling & Tracking
Project Scheduling & TrackingProject Scheduling & Tracking
Project Scheduling & TrackingFahim Tuhin
 
ROI of Content Marketing - GDMS Conference
ROI of Content Marketing - GDMS ConferenceROI of Content Marketing - GDMS Conference
ROI of Content Marketing - GDMS ConferenceAshley Segura
 
Agentless Patch Management for the Data Center
Agentless Patch Management for the Data CenterAgentless Patch Management for the Data Center
Agentless Patch Management for the Data CenterIvanti
 
Predictive Analytics - Get Skilled or Die Trying
Predictive Analytics - Get Skilled or Die TryingPredictive Analytics - Get Skilled or Die Trying
Predictive Analytics - Get Skilled or Die TryingKienco
 
Gabe Tartaglia - Engaging in a Connected World With the Power of Audio
Gabe Tartaglia	 - Engaging in a Connected World With the Power of AudioGabe Tartaglia	 - Engaging in a Connected World With the Power of Audio
Gabe Tartaglia - Engaging in a Connected World With the Power of AudioJulia Grosman
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Reimagining Retail by @JohnBatistich
Reimagining Retail by @JohnBatistichReimagining Retail by @JohnBatistich
Reimagining Retail by @JohnBatistichjbatistich
 
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...Distilled
 
Drones - What's next?
Drones - What's next?Drones - What's next?
Drones - What's next?Speck&Tech
 
An introduction to Digital Marketing
An introduction to Digital MarketingAn introduction to Digital Marketing
An introduction to Digital MarketingShi Yunn Chua
 
Vertical Measures Webinar: Is There Any ROI in Content Marketing?
Vertical Measures Webinar: Is There Any ROI in Content Marketing?Vertical Measures Webinar: Is There Any ROI in Content Marketing?
Vertical Measures Webinar: Is There Any ROI in Content Marketing?Ashley Segura
 
Content Marketing ROI
Content Marketing ROI Content Marketing ROI
Content Marketing ROI Stukent Inc.
 
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS SummitGain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS SummitAmazon Web Services
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty ProgramsHackerOne
 

What's hot (19)

Small Investments, Big Returns: Three Successful Data Science Use Cases
Small Investments, Big Returns: Three Successful Data Science Use CasesSmall Investments, Big Returns: Three Successful Data Science Use Cases
Small Investments, Big Returns: Three Successful Data Science Use Cases
 
Project Scheduling & Tracking
Project Scheduling & TrackingProject Scheduling & Tracking
Project Scheduling & Tracking
 
Survey Says! 2017 Shrink Data Results
Survey Says! 2017 Shrink Data ResultsSurvey Says! 2017 Shrink Data Results
Survey Says! 2017 Shrink Data Results
 
ROI of Content Marketing - GDMS Conference
ROI of Content Marketing - GDMS ConferenceROI of Content Marketing - GDMS Conference
ROI of Content Marketing - GDMS Conference
 
Agentless Patch Management for the Data Center
Agentless Patch Management for the Data CenterAgentless Patch Management for the Data Center
Agentless Patch Management for the Data Center
 
Predictive Analytics - Get Skilled or Die Trying
Predictive Analytics - Get Skilled or Die TryingPredictive Analytics - Get Skilled or Die Trying
Predictive Analytics - Get Skilled or Die Trying
 
Gabe Tartaglia - Engaging in a Connected World With the Power of Audio
Gabe Tartaglia	 - Engaging in a Connected World With the Power of AudioGabe Tartaglia	 - Engaging in a Connected World With the Power of Audio
Gabe Tartaglia - Engaging in a Connected World With the Power of Audio
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
How to Use Video to Drive Leads
How to Use Video to Drive LeadsHow to Use Video to Drive Leads
How to Use Video to Drive Leads
 
DSA Presentation 3
DSA Presentation 3DSA Presentation 3
DSA Presentation 3
 
Reimagining Retail by @JohnBatistich
Reimagining Retail by @JohnBatistichReimagining Retail by @JohnBatistich
Reimagining Retail by @JohnBatistich
 
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
 
Drones - What's next?
Drones - What's next?Drones - What's next?
Drones - What's next?
 
An introduction to Digital Marketing
An introduction to Digital MarketingAn introduction to Digital Marketing
An introduction to Digital Marketing
 
Being human - TEDxNUS - Jose Sepulveda
Being human  - TEDxNUS - Jose Sepulveda Being human  - TEDxNUS - Jose Sepulveda
Being human - TEDxNUS - Jose Sepulveda
 
Vertical Measures Webinar: Is There Any ROI in Content Marketing?
Vertical Measures Webinar: Is There Any ROI in Content Marketing?Vertical Measures Webinar: Is There Any ROI in Content Marketing?
Vertical Measures Webinar: Is There Any ROI in Content Marketing?
 
Content Marketing ROI
Content Marketing ROI Content Marketing ROI
Content Marketing ROI
 
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS SummitGain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty Programs
 

Similar to 11 Critical Areas of Cybersecurity Focus for Financial Institutions

[Webinar] Intelligent insight Driven Policing Webinar Presentation
[Webinar] Intelligent insight Driven Policing Webinar Presentation [Webinar] Intelligent insight Driven Policing Webinar Presentation
[Webinar] Intelligent insight Driven Policing Webinar Presentation MC+A
 
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...Lucidworks
 
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...Lucidworks
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity BattleGovLoop
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEKMarketing
 
MIC A Practical Approach
MIC A Practical ApproachMIC A Practical Approach
MIC A Practical ApproachAustin Skidmore
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseSophiaPalmira1
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampSophia Price
 
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - LondonGRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - LondonGRESB
 
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party RiskCTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party RiskCTEKMarketing
 
Final Project DescriptionThe goal of this assignment is again t
Final Project DescriptionThe goal of this assignment is again tFinal Project DescriptionThe goal of this assignment is again t
Final Project DescriptionThe goal of this assignment is again tChereCheek752
 
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...RootedCON
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondLucidworks
 
e-Kasih, National Databank on Poverty, Malaysia
e-Kasih, National Databank on Poverty, Malaysiae-Kasih, National Databank on Poverty, Malaysia
e-Kasih, National Databank on Poverty, MalaysiaUNDP India
 
Predictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform EraPredictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform EraIDC Italy
 
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...FortuneCMO, LLC
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)PwC France
 
Presentation on BIKON - International BI conference
Presentation on BIKON - International BI conferencePresentation on BIKON - International BI conference
Presentation on BIKON - International BI conferenceKunal Bhattacharya
 
Best Practices in Global Risk Management
Best Practices in Global Risk Management Best Practices in Global Risk Management
Best Practices in Global Risk Management Dun & Bradstreet
 

Similar to 11 Critical Areas of Cybersecurity Focus for Financial Institutions (20)

[Webinar] Intelligent insight Driven Policing Webinar Presentation
[Webinar] Intelligent insight Driven Policing Webinar Presentation [Webinar] Intelligent insight Driven Policing Webinar Presentation
[Webinar] Intelligent insight Driven Policing Webinar Presentation
 
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
 
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity Battle
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
 
MIC A Practical Approach
MIC A Practical ApproachMIC A Practical Approach
MIC A Practical Approach
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware Bootcamp
 
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - LondonGRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
 
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party RiskCTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
 
Final Project DescriptionThe goal of this assignment is again t
Final Project DescriptionThe goal of this assignment is again tFinal Project DescriptionThe goal of this assignment is again t
Final Project DescriptionThe goal of this assignment is again t
 
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
 
Advertising Analytics 2.0
Advertising Analytics 2.0Advertising Analytics 2.0
Advertising Analytics 2.0
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and Beyond
 
e-Kasih, National Databank on Poverty, Malaysia
e-Kasih, National Databank on Poverty, Malaysiae-Kasih, National Databank on Poverty, Malaysia
e-Kasih, National Databank on Poverty, Malaysia
 
Predictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform EraPredictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform Era
 
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)
 
Presentation on BIKON - International BI conference
Presentation on BIKON - International BI conferencePresentation on BIKON - International BI conference
Presentation on BIKON - International BI conference
 
Best Practices in Global Risk Management
Best Practices in Global Risk Management Best Practices in Global Risk Management
Best Practices in Global Risk Management
 

Recently uploaded

Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 

Recently uploaded (20)

Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 

11 Critical Areas of Cybersecurity Focus for Financial Institutions

  • 1. 11 CRITICAL AREAS OF
 CYBERSECURITY FOCUS FOR FINANCIAL INSTITUTIONS I N T E L L I S E C P A R T N E R S P R E S E N T : C Y B E R S E C U R I T Y R O U N D TA B L E / F E B 2 0 1 5
  • 2. A G E N D A • Cybersecurity Role in Risk Management • New Regulatory Guidance • 11 Areas of Focus • Next Steps
  • 3. N Y S D E PA R T M E N T O F F I N A N C I A L S E R V I C E S : “ T H E D E PA R T M E N T E N C O U R A G E S A L L I N S T I T U T I O N S T O V I E W C Y B E R S E C U R I T Y A S A N I N T E G R A L A S P E C T O F T H E I R O V E R A L L R I S K M A N A G E M E N T S T R AT E G Y, R AT H E R T H A N S O L E LY A S A S U B S E T O F I N F O R M AT I O N T E C H N O L O G Y. ”
  • 4. N E W F O C U S • Frequency and sophistication of cyberattacks continue to grow • Increased focus on cybersecurity by Federal and State regulators • Cybersecurity should be a top-of-mind strategic concern • Potential ramifications too serious to ignore
  • 5. 1 1 C R I T I C A L A R E A S O F C Y B E R S E C U R I T Y F O C U S
  • 6. 1 . C O R P O R AT E G O V E R N A N C E Tone At The Top Matters Cybersecurity No Exception Cybersecurity Not Just An IT Issue
  • 7. 2 . M A N A G E M E N T O F C Y B E R S E C U R I T Y I S S U E S Interaction Between Information Security & Core Business Functions Written Information Security Policies & Procedures Periodic Re-Evaluation
  • 8. 3 . S E C U R I T Y & R I S K M A N A G E M E N T R E S O U R C E S The Right People The Right Processes The Right Technology
  • 9. 4 . S H A R E D I N F R A S T R U C T U R E R I S K S Think “Least Privilege” Segregate Critical Data Focused Due Diligence
  • 10. 5 . I N T R U S I O N P R O T E C T I O N Multi-Factor Authentication Server & Database Configurations Focus On Critical Data, Not Transaction Type
  • 11. 6 . S E C U R I T Y T E S T I N G & M O N I T O R I N G Penetration Testing Annual Tests May Not Longer Be Sufficient Focus On Critical Data
  • 12. 7 . I N C I D E N T D E T E C T I O N A N D R E S P O N S E Sufficient Monitoring Detection Of Attacks Speed Of Response
  • 13. 8 . O N G O I N G T R A I N I N G Cybersecurity Training For All Staff Specialized Training
  • 14. 9 . M A N A G E M E N T O F T H I R D - PA RT Y S E RV I C E P R O V I D E R S Extended Cybersecurity Boundaries Identify Risks & Controls Confirm “Chain Of Trust”
  • 15. 1 0 . B U S I N E S S C O N T I N U I T Y A N D D I S A S T E R R E C O V E RY Integrate With Cybersecurity Policies & Procedures Testing & Verification
  • 16. 1 1 . C Y B E R S E C U R I T Y I N S U R A N C E Part Of Risk Control Strategy Note Exclusions Evaluate Periodically
  • 17. N E X T S T E P S • List not exhaustive • Your cyber threat profile is unique • Thorough and proactive evaluation of cyber risks necessary
  • 18. W E C A N H E L P INTELLISECPARTNERS.COM 602.341.3435