SlideShare una empresa de Scribd logo
1 de 44
Descargar para leer sin conexión
How to Approach the NYDFS
Proposed Cybersecurity
Requirements
About the Presenters
Douglas Kelly
Lead Legal Writer
EverFi
Brian Ralston
Compliance Training Executive
EverFi
Purpose of Webinar
● Explain key legal requirements of the Regulation and
how it interacts with other data security laws.
● Trends, industry best practices, and the value of online
compliance training.
Why We Care About The Regulation
Out of 78 surveyed in-house counsel and compliance
professionals:
● 73% said cybersecurity was their biggest compliance
risk.
● 72% said data breaches were their second biggest
compliance risk.
DLA Piper. (Apr. 2016). Compliance & Risk Report: CCOs Under Scrutiny. Retrieved from
https://www.dlapiper.com/~/media/Files/Insights/Publications/2016/04/DLA_Piper_Complia
nce_Risk_Survey_Report2016.pdf.
Why We Care About The Regulation
The DFS reports:
● 79% of surveyed depository institutions were increasing
their cybersecurity budgets for 2014 - 2017.
● Top three factors driving cybersecurity spending:
1. Compliance and regulatory requirements
2. Business continuity and disaster recovery
3. Reputation
New York State Department of Financial Services. (May 2014). Report on Cyber Security
in the Banking Sector. Retrieved from
http://www.dfs.ny.gov/reportpub/dfs_cyber_banking_report_052014.pdf.
Why We Care About The Regulation
● Data Breaches
○ “Most institutions irrespective of size experienced intrusions or attempted intrusions
into their IT systems over the past three years.” DFS.
● FinTech
○ “As technology dependence in the financial sector continues to grow, so do
opportunities for high-impact technology failures and cyber-attacks.” Federal Rese
Board.
● Reputation
Agenda
● Regulation Key Requirements
● Industry Best Practices and Trends
● Value of Employee Conduct Training
THE REGULATION
Key Facts and Dates
● New York State Department of Financial Services (DFS)
● Who’s Covered
○ Anyone authorized to operate under New York banking, insurance, or
financial services laws. Unclear.
● Effective?
○ January 1, 2017.
○ BUT have until June 30, 2017 to comply.
23 NYCRR 500.20, 21
Case Study
● OCC Security Breach - October 2016
○ Employee downloaded confidential OCC data onto a thumb drive, retired.
○ Download happened 11/2015, not discovered until 9/2016 during audit (performed
every two years).
○ No policy forbidding access at time of download.
○ Data was encrypted, no confidential information misused or leaked.
○ OCC immediately contacted appropriate personnel, then Congress.
NONPUBLIC INFORMATION
Nonpublic Information - General
1. Electronic, “business related information” that would cause a
“material adverse impact to the business, operations or security”
if released.
OCC Case Study
23 NYCRR 500.01(g)(1), (j)
Nonpublic Information - Financial
2. Any information that an individual provides in
connection with any financial product or service.
→ Gramm-Leach-Bliley Act - Privacy Rule
23 NYCRR 500.01(g)(2)
“nonpublic personal information”
{ }
Nonpublic Information - Health
3. Health information. “Any information... that relates to the... physical, mental or
behavioral health or condition of any individual... [and] payment for... health care.”
→ Health Insurance Portability Protection Act (HIPAA) - Privacy Rule
23 NYCRR 500.01(g)(3)
“Individually identifiable health information”
{ }
Nonpublic Information - Catch-all
4. “Any information that can be used to distinguish or trace an individual’s identity”
or “linkable to an individual”
→ EU General Data Privacy Regulation (GDPR) FAQ
23 NYCRR 500.01(g)(4)
“Any information related to a natural person
. . . that can be used to directly or indirectly
identify the person.”{ }
Takeaway #1
Only Nonpublic Information
CYBERSECURITY PROGRAM
Background - NIST and FFIEC
National Institute of Standards and Technology’s (NIST)
Framework Core
● Keep a lookout for Events and Presentations, News
○ Ex. Nov. 2016 - IoT Guidance
Federal Financial Institutions Examination Council (FFIEC)
Cybersecurity Assessment Tool
● FFIEC Information Technology Examination Handbook, NIST
23 NYCRR 500.02
The Law - Cybersecurity Program
Your cybersecurity program must now include:
1. Identify Cyber Risks
2. Protect Nonpublic Information
3. Detect Cybersecurity Events
4. Respond to Cybersecurity Events
5. Recover from Cybersecurity Events
6. Fulfill all regulatory reporting obligations
23 NYCRR 500.02
Pending Regulations, Bills
Two pending laws reflect the same “risk-based” approach:
● Data Security Act of 2015 (A06866)
○ Requires “reasonable safeguards”
○ Incorporates GLB Act, HIPAA, NIST, and international laws.
● Enhanced Cyber Risk Management Standards
○ Interagency proposed rule
○ Incorporates NIST, FFIEC, GLB Act
International Laws
Big international laws require similar security measures:
● EU Data Privacy Shield
○ “reasonable and appropriate measures to protect [data] from loss,
misuse and unauthorized access. . . taking into due account the risks.”
● GDPR
○ “implement appropriate technical and organizational measures” taking
into account “the state of the art and the costs of implementation . . . as
well as the risk of varying likelihood and severity.”
Takeaway #2
Risk Management
CYBERSECURITY POLICIES
Cybersecurity Policies - Four Requirements
● Cybersecurity Policy
○ 14 subjects, including “systems and network monitoring” “vendor
and third-party service provider management” “risk assessment”
● Incident Response Plan
● Third Party Information Security Policy
● Security for In-House Developed Applications
OCC Case Study
23 NYCRR 500.03, 500.11, 500.16, 500.08
Cybersecurity Policies - Third Parties
Two main requirements when doing business with third parties:
● Written policy re: security that third parties must use IF handling nonpublic information.
○ “periodic assessment, at least annually, of such third parties and the continued adequacy of
their cybersecurity practices.”
● Put specific warranties in third party contracts.
○ Ex. “Multi-Factor Authentication” “encryption”
23 NYCRR 500.11
Cybersecurity Policies - Third Parties
Two things to consider:
● Third party ability to comply with data security requirements.
● International Laws
○ GDPR
■ “contracts with processors [must] comply with the GDPR”
○ EU Data Privacy Shield
■ contracts with third party “controllers”
Cybersecurity Policies - FTC
Failure to comply with your own cybersecurity policies is an “unfair practice”
under the FTC Act
● LabMD, Inc., Credit Karma, Fandango
“In this case, LabMD had policies in place that might have avoided the breach, but the policies
weren’t followed. In addition, all employees should have a basic knowledge of data security and
privacy [which, they did not].”
Day, Christine. (2016, Aug. 7). Failure to Protect Data is an Unfair Practice. LawRoom Blog. Retrieved from
http://blog.lawroom.com/data-security/failure-to-protect-data-is-an-unfair-practice/?_sft_category=data-security.
Cybersecurity Policies - Culture
A culture of compliance ensures employees actually follow your policy:
● Tone at the Top
● Legitimacy
○ i.e. codes and policies being enforced visibly and fairly.
● Management
○ i.e. taking policies seriously and following them.
Kelly, Douglas. (Sept. 2016) Compliance Culture: What It Is, and How To Build It. Retrieved from
https://www.youtube.com/watch?v=AIiSJp8jIWc&feature=youtu.be.
Cybersecurity Policies - Action Plan
Compare all data security policies:
● Privacy notices to customers
○ Ex. “nonpublic personal information”*
● Existing internal data security policies
● Third party contracts and policies
● Online privacy statement
*16 C.F.R. § 313.6(a)(1)
Takeaway #3
If You Write It, Do It
Other Requirements
Security Requirements
Required security protocols:
● Penetration Testing and Vulnerability Assessment. 500.05
○ annually, quarterly
● Audit Trail. 500.06
● Access Restrictions. 500.07
● Risk Assessments. 500.09
● Application Security. 500.08
● Multi-Factor Authentication. 500.12
● Data Disposal. 500.13
● Encryption. 500.15
OCC Case Study
Staffing Requirements
Two main changes:
● Chief Information Security Officer (CISO) to oversee program
● Adequate personnel to maintain cybersecurity program
OCC Case Study
23 NYCRR 500.04, 500.10
Reporting Requirements
New reporting requirements:
● CISO report to Board of Directors (2x a year)
● CISO and Board certify compliance to DFS (1x a year)
● CISO report to DFS if there’s a breach
Old reporting requirements:
● NYS Information Security Breach and Notification Act
OCC Case Study
23 NYCRR 500.04
Training Requirements
Monitor activity of Authorized Users
● Mitigate risks, implement controls
Train all employees
● “require all personnel to attend regular cybersecurity awareness
training sessions . . . updated to reflect risks identified by the . . .
annual assessment of risks.”
23 NYCRR 500.15
Takeaway #4
It Takes a Village
Training
Employees Are Critical Assets
“Although external threats tend to grab headlines, insider breaches from employees, consultants, and
others can do just as much—if not more—harm to an institution.” DFS.
“Establishing an information security culture that promotes an effective information security program and
the role of all employees in protecting the institution's information and systems.” FFIEC IT Examination
Handbook.
“76% of IT respondents (up from 67% in a 2014 study) said that their organization had experienced the
loss or theft of company data in the last two years. Insider negligence was more than twice as likely as
external attackers to compromise insider accounts.” Ponemon Institute.
Data Security Threats
● Phishing
○ “In one instance, Verizon analyzed millions of phishing scams and found that 30% of phishing
messages were opened by employees.”
● Shadow IT
○ “80 percent of employees use unsanctioned web applications for work.”
● Password Reuse
○ “63% of confirmed data breaches exploited stolen, weak, or default passwords.”
Recap
The DFS requires the following of your cybersecurity program:
● Identification of cyber risks.
● Implementation of policies and procedures to protect unauthorized access/use or other malicious
acts.
● Detection of cybersecurity events.
● Responsiveness to identified cybersecurity events to mitigate any negative events.
● Recovery from cybersecurity events and restoration of normal operations and services.
Our Training - Checkpoint
The DFS requires the following of your cybersecurity program:
● Identification of cyber risks.
● Implementation of policies and procedures to protect unauthorized access/use or other malicious
acts.
● Detection of cybersecurity events.
● Responsiveness to identified cybersecurity events to mitigate any negative events.
● Recovery from cybersecurity events and restoration of normal operations and services.
About LawRoom
● 20 years in business
● 10 attorneys on staff to help ensure ongoing course compliance and
proactive updates
● 20 instructional designers
● 6 mm employees and students will train with us in 2016
● 3300 corporations and universities rely on us today for compliance training
● Raised 61 million in funding (Amazon founder - Jeff Bezos, Twitter
co-founder - Evan Williams, Google EC - Eric Schmidt)
LawRoom Blog:
blog.lawroom.com
Compliance Tips
Thought-Leadership
Free to Join
Four Posts a Week
Request a Demo
If you would like to learn more about how LawRoom (powered by EverFi) can help you
meet these requirements, please contact us or type “DEMO” in the comments section.
Brian Ralston: bralston@everfi.com
Arjun Sharma: asharma@everfi.com

Más contenido relacionado

La actualidad más candente

Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-IT Strategy Group
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorCBIZ, Inc.
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthPECB
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 

La actualidad más candente (20)

Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
IASA ey deck presentation
IASA ey deck presentationIASA ey deck presentation
IASA ey deck presentation
 
Data breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundationData breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundation
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
 
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in Depth
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 

Destacado

4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Ensuring Security and Compliance in a Data Deluge
Ensuring Security and Compliance in a Data DelugeEnsuring Security and Compliance in a Data Deluge
Ensuring Security and Compliance in a Data DelugeTripwire
 
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016Steven Reback
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overviewukdpe
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaCaserta
 
10 Keys to Data-Centric Security
10 Keys to Data-Centric Security10 Keys to Data-Centric Security
10 Keys to Data-Centric SecuritySirius
 
Seven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption StrategySeven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption StrategySirius
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Ulf Mattsson
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destacado (13)

4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Ensuring Security and Compliance in a Data Deluge
Ensuring Security and Compliance in a Data DelugeEnsuring Security and Compliance in a Data Deluge
Ensuring Security and Compliance in a Data Deluge
 
myCVmaged
myCVmagedmyCVmaged
myCVmaged
 
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with Cloudera
 
10 Keys to Data-Centric Security
10 Keys to Data-Centric Security10 Keys to Data-Centric Security
10 Keys to Data-Centric Security
 
Seven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption StrategySeven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption Strategy
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a How to Approach the NYDFS Proposed Cybersecurity Requirements

Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsSkoda Minotti
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxsoulscout02
 
EVERFI Webinar: Training Under the New York Cybersecurity Requirements
EVERFI Webinar: Training Under the New York Cybersecurity RequirementsEVERFI Webinar: Training Under the New York Cybersecurity Requirements
EVERFI Webinar: Training Under the New York Cybersecurity RequirementsMichele Collu
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ, Inc.
 
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...IAB Bulgaria
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaLizbethQuinonez813
 

Similar a How to Approach the NYDFS Proposed Cybersecurity Requirements (20)

Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
EVERFI Webinar: Training Under the New York Cybersecurity Requirements
EVERFI Webinar: Training Under the New York Cybersecurity RequirementsEVERFI Webinar: Training Under the New York Cybersecurity Requirements
EVERFI Webinar: Training Under the New York Cybersecurity Requirements
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018
 
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...Data Privacy Program – a customized solution for the new EU General Regulatio...
Data Privacy Program – a customized solution for the new EU General Regulatio...
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 

Más de Kyle Brown

Building an Ethical Culture: Conduct Training Best Practices
Building an Ethical Culture: Conduct Training Best PracticesBuilding an Ethical Culture: Conduct Training Best Practices
Building an Ethical Culture: Conduct Training Best PracticesKyle Brown
 
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...Kyle Brown
 
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...Kyle Brown
 
Leveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and AccountabilityLeveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and AccountabilityKyle Brown
 
The Process of Programming: Exploring Best Practices for Effective Prevention...
The Process of Programming: Exploring Best Practices for Effective Prevention...The Process of Programming: Exploring Best Practices for Effective Prevention...
The Process of Programming: Exploring Best Practices for Effective Prevention...Kyle Brown
 
Learning from Penn State: Five Lessons in Compliance
Learning from Penn State: Five Lessons in Compliance Learning from Penn State: Five Lessons in Compliance
Learning from Penn State: Five Lessons in Compliance Kyle Brown
 

Más de Kyle Brown (6)

Building an Ethical Culture: Conduct Training Best Practices
Building an Ethical Culture: Conduct Training Best PracticesBuilding an Ethical Culture: Conduct Training Best Practices
Building an Ethical Culture: Conduct Training Best Practices
 
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
From the Top Down to the Bottom-Up: Making Campus Wide Safety An Institution ...
 
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
The Four Questions You Must Ask to Transform Your Prevention Strategy from Go...
 
Leveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and AccountabilityLeveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and Accountability
 
The Process of Programming: Exploring Best Practices for Effective Prevention...
The Process of Programming: Exploring Best Practices for Effective Prevention...The Process of Programming: Exploring Best Practices for Effective Prevention...
The Process of Programming: Exploring Best Practices for Effective Prevention...
 
Learning from Penn State: Five Lessons in Compliance
Learning from Penn State: Five Lessons in Compliance Learning from Penn State: Five Lessons in Compliance
Learning from Penn State: Five Lessons in Compliance
 

Último

Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 

Último (20)

Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 

How to Approach the NYDFS Proposed Cybersecurity Requirements

  • 1. How to Approach the NYDFS Proposed Cybersecurity Requirements
  • 2. About the Presenters Douglas Kelly Lead Legal Writer EverFi Brian Ralston Compliance Training Executive EverFi
  • 3. Purpose of Webinar ● Explain key legal requirements of the Regulation and how it interacts with other data security laws. ● Trends, industry best practices, and the value of online compliance training.
  • 4. Why We Care About The Regulation Out of 78 surveyed in-house counsel and compliance professionals: ● 73% said cybersecurity was their biggest compliance risk. ● 72% said data breaches were their second biggest compliance risk. DLA Piper. (Apr. 2016). Compliance & Risk Report: CCOs Under Scrutiny. Retrieved from https://www.dlapiper.com/~/media/Files/Insights/Publications/2016/04/DLA_Piper_Complia nce_Risk_Survey_Report2016.pdf.
  • 5. Why We Care About The Regulation The DFS reports: ● 79% of surveyed depository institutions were increasing their cybersecurity budgets for 2014 - 2017. ● Top three factors driving cybersecurity spending: 1. Compliance and regulatory requirements 2. Business continuity and disaster recovery 3. Reputation New York State Department of Financial Services. (May 2014). Report on Cyber Security in the Banking Sector. Retrieved from http://www.dfs.ny.gov/reportpub/dfs_cyber_banking_report_052014.pdf.
  • 6. Why We Care About The Regulation ● Data Breaches ○ “Most institutions irrespective of size experienced intrusions or attempted intrusions into their IT systems over the past three years.” DFS. ● FinTech ○ “As technology dependence in the financial sector continues to grow, so do opportunities for high-impact technology failures and cyber-attacks.” Federal Rese Board. ● Reputation
  • 7. Agenda ● Regulation Key Requirements ● Industry Best Practices and Trends ● Value of Employee Conduct Training
  • 9. Key Facts and Dates ● New York State Department of Financial Services (DFS) ● Who’s Covered ○ Anyone authorized to operate under New York banking, insurance, or financial services laws. Unclear. ● Effective? ○ January 1, 2017. ○ BUT have until June 30, 2017 to comply. 23 NYCRR 500.20, 21
  • 10. Case Study ● OCC Security Breach - October 2016 ○ Employee downloaded confidential OCC data onto a thumb drive, retired. ○ Download happened 11/2015, not discovered until 9/2016 during audit (performed every two years). ○ No policy forbidding access at time of download. ○ Data was encrypted, no confidential information misused or leaked. ○ OCC immediately contacted appropriate personnel, then Congress.
  • 12. Nonpublic Information - General 1. Electronic, “business related information” that would cause a “material adverse impact to the business, operations or security” if released. OCC Case Study 23 NYCRR 500.01(g)(1), (j)
  • 13. Nonpublic Information - Financial 2. Any information that an individual provides in connection with any financial product or service. → Gramm-Leach-Bliley Act - Privacy Rule 23 NYCRR 500.01(g)(2) “nonpublic personal information” { }
  • 14. Nonpublic Information - Health 3. Health information. “Any information... that relates to the... physical, mental or behavioral health or condition of any individual... [and] payment for... health care.” → Health Insurance Portability Protection Act (HIPAA) - Privacy Rule 23 NYCRR 500.01(g)(3) “Individually identifiable health information” { }
  • 15. Nonpublic Information - Catch-all 4. “Any information that can be used to distinguish or trace an individual’s identity” or “linkable to an individual” → EU General Data Privacy Regulation (GDPR) FAQ 23 NYCRR 500.01(g)(4) “Any information related to a natural person . . . that can be used to directly or indirectly identify the person.”{ }
  • 18. Background - NIST and FFIEC National Institute of Standards and Technology’s (NIST) Framework Core ● Keep a lookout for Events and Presentations, News ○ Ex. Nov. 2016 - IoT Guidance Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool ● FFIEC Information Technology Examination Handbook, NIST 23 NYCRR 500.02
  • 19. The Law - Cybersecurity Program Your cybersecurity program must now include: 1. Identify Cyber Risks 2. Protect Nonpublic Information 3. Detect Cybersecurity Events 4. Respond to Cybersecurity Events 5. Recover from Cybersecurity Events 6. Fulfill all regulatory reporting obligations 23 NYCRR 500.02
  • 20. Pending Regulations, Bills Two pending laws reflect the same “risk-based” approach: ● Data Security Act of 2015 (A06866) ○ Requires “reasonable safeguards” ○ Incorporates GLB Act, HIPAA, NIST, and international laws. ● Enhanced Cyber Risk Management Standards ○ Interagency proposed rule ○ Incorporates NIST, FFIEC, GLB Act
  • 21. International Laws Big international laws require similar security measures: ● EU Data Privacy Shield ○ “reasonable and appropriate measures to protect [data] from loss, misuse and unauthorized access. . . taking into due account the risks.” ● GDPR ○ “implement appropriate technical and organizational measures” taking into account “the state of the art and the costs of implementation . . . as well as the risk of varying likelihood and severity.”
  • 24. Cybersecurity Policies - Four Requirements ● Cybersecurity Policy ○ 14 subjects, including “systems and network monitoring” “vendor and third-party service provider management” “risk assessment” ● Incident Response Plan ● Third Party Information Security Policy ● Security for In-House Developed Applications OCC Case Study 23 NYCRR 500.03, 500.11, 500.16, 500.08
  • 25. Cybersecurity Policies - Third Parties Two main requirements when doing business with third parties: ● Written policy re: security that third parties must use IF handling nonpublic information. ○ “periodic assessment, at least annually, of such third parties and the continued adequacy of their cybersecurity practices.” ● Put specific warranties in third party contracts. ○ Ex. “Multi-Factor Authentication” “encryption” 23 NYCRR 500.11
  • 26. Cybersecurity Policies - Third Parties Two things to consider: ● Third party ability to comply with data security requirements. ● International Laws ○ GDPR ■ “contracts with processors [must] comply with the GDPR” ○ EU Data Privacy Shield ■ contracts with third party “controllers”
  • 27. Cybersecurity Policies - FTC Failure to comply with your own cybersecurity policies is an “unfair practice” under the FTC Act ● LabMD, Inc., Credit Karma, Fandango “In this case, LabMD had policies in place that might have avoided the breach, but the policies weren’t followed. In addition, all employees should have a basic knowledge of data security and privacy [which, they did not].” Day, Christine. (2016, Aug. 7). Failure to Protect Data is an Unfair Practice. LawRoom Blog. Retrieved from http://blog.lawroom.com/data-security/failure-to-protect-data-is-an-unfair-practice/?_sft_category=data-security.
  • 28. Cybersecurity Policies - Culture A culture of compliance ensures employees actually follow your policy: ● Tone at the Top ● Legitimacy ○ i.e. codes and policies being enforced visibly and fairly. ● Management ○ i.e. taking policies seriously and following them. Kelly, Douglas. (Sept. 2016) Compliance Culture: What It Is, and How To Build It. Retrieved from https://www.youtube.com/watch?v=AIiSJp8jIWc&feature=youtu.be.
  • 29. Cybersecurity Policies - Action Plan Compare all data security policies: ● Privacy notices to customers ○ Ex. “nonpublic personal information”* ● Existing internal data security policies ● Third party contracts and policies ● Online privacy statement *16 C.F.R. § 313.6(a)(1)
  • 30. Takeaway #3 If You Write It, Do It
  • 32. Security Requirements Required security protocols: ● Penetration Testing and Vulnerability Assessment. 500.05 ○ annually, quarterly ● Audit Trail. 500.06 ● Access Restrictions. 500.07 ● Risk Assessments. 500.09 ● Application Security. 500.08 ● Multi-Factor Authentication. 500.12 ● Data Disposal. 500.13 ● Encryption. 500.15 OCC Case Study
  • 33. Staffing Requirements Two main changes: ● Chief Information Security Officer (CISO) to oversee program ● Adequate personnel to maintain cybersecurity program OCC Case Study 23 NYCRR 500.04, 500.10
  • 34. Reporting Requirements New reporting requirements: ● CISO report to Board of Directors (2x a year) ● CISO and Board certify compliance to DFS (1x a year) ● CISO report to DFS if there’s a breach Old reporting requirements: ● NYS Information Security Breach and Notification Act OCC Case Study 23 NYCRR 500.04
  • 35. Training Requirements Monitor activity of Authorized Users ● Mitigate risks, implement controls Train all employees ● “require all personnel to attend regular cybersecurity awareness training sessions . . . updated to reflect risks identified by the . . . annual assessment of risks.” 23 NYCRR 500.15
  • 36. Takeaway #4 It Takes a Village
  • 38. Employees Are Critical Assets “Although external threats tend to grab headlines, insider breaches from employees, consultants, and others can do just as much—if not more—harm to an institution.” DFS. “Establishing an information security culture that promotes an effective information security program and the role of all employees in protecting the institution's information and systems.” FFIEC IT Examination Handbook. “76% of IT respondents (up from 67% in a 2014 study) said that their organization had experienced the loss or theft of company data in the last two years. Insider negligence was more than twice as likely as external attackers to compromise insider accounts.” Ponemon Institute.
  • 39. Data Security Threats ● Phishing ○ “In one instance, Verizon analyzed millions of phishing scams and found that 30% of phishing messages were opened by employees.” ● Shadow IT ○ “80 percent of employees use unsanctioned web applications for work.” ● Password Reuse ○ “63% of confirmed data breaches exploited stolen, weak, or default passwords.”
  • 40. Recap The DFS requires the following of your cybersecurity program: ● Identification of cyber risks. ● Implementation of policies and procedures to protect unauthorized access/use or other malicious acts. ● Detection of cybersecurity events. ● Responsiveness to identified cybersecurity events to mitigate any negative events. ● Recovery from cybersecurity events and restoration of normal operations and services.
  • 41. Our Training - Checkpoint The DFS requires the following of your cybersecurity program: ● Identification of cyber risks. ● Implementation of policies and procedures to protect unauthorized access/use or other malicious acts. ● Detection of cybersecurity events. ● Responsiveness to identified cybersecurity events to mitigate any negative events. ● Recovery from cybersecurity events and restoration of normal operations and services.
  • 42. About LawRoom ● 20 years in business ● 10 attorneys on staff to help ensure ongoing course compliance and proactive updates ● 20 instructional designers ● 6 mm employees and students will train with us in 2016 ● 3300 corporations and universities rely on us today for compliance training ● Raised 61 million in funding (Amazon founder - Jeff Bezos, Twitter co-founder - Evan Williams, Google EC - Eric Schmidt)
  • 44. Request a Demo If you would like to learn more about how LawRoom (powered by EverFi) can help you meet these requirements, please contact us or type “DEMO” in the comments section. Brian Ralston: bralston@everfi.com Arjun Sharma: asharma@everfi.com