SlideShare una empresa de Scribd logo
1 de 23
September 2015
CYBERSECURITY
BEST PRACTICES
IN FINANCIAL SERVICES
• Cybersecurity is of increasing importance to organizations in the
financial services industry
• It is not clear how aware the C suite is of their enterprise’s cyber
security programs, awareness of their strategy and tactics
• Cyber attacks pose a great threat to organizations, many of which
may not even know they have been victimized
• These incursions can disrupt business, steal and/or destroy data
• While many firms view cybersecurity as a technology and
compliance issue; in reality it should be viewed as a core business
risk
• It is essential that firms are proactive in their strategies to prevent
cyber attacks.
• This document will describe the current state of best practices for
cybersecurity within global financial services firms.
Cybersecurity Best Practices in Financial Services
Introduction
2
• The highest cybersecurity concerns surround network intrusions,
security breaches, the potential for theft, data corruption and
reputational damage
• Cyber attacks can encompass financial, technical, reputational
and/or regulatory threats
• There is a fine line between enforcing tight information security
controls and providing robust business value
• People are the weakest link in the cybersecurity chain; there is a
need for ongoing cybersecurity awareness and preparedness
training
• Firms should identify and segment the more significant key controls,
based on threat assessments (e.g., DDoS attacks, theft of data, data
corruption).
Cybersecurity Best Practices in Financial Services
Background
3
• Have a robust and ongoing cybersecurity test regime
• Cyber testing should be designed around potential and currently
unforeseen cyber incident scenarios
• Conduct penetration testing of enterprise systems and client-facing
systems, with penetration from both an external basis and an
internal basis
• Testing frameworks should be based on access to threat intelligence
and staff involvement in scope and testing.
Cybersecurity Best Practices in Financial Services
Background (Cont’d) …
4
• The persistent threat of cyber attacks makes managing risk a
greater focus than before
• To properly manage risk, firms must be proactive in their efforts to
prepare for potential attack scenarios by not only being ready for
them, but by actively searching for potential breaches and
successfully removing them.
Cybersecurity Best Practices in Financial Services
Proactive Cybersecurity
Risk Management
5
• Establish policies and procedures ahead of time, so you are not
improvising, should an attack occur
• Gather intelligence so you can identify high impact alerts and
prioritize what to tackle first
• Position equipment to analyze firewalls and logs to search for
anomalies
• Identify your major concerns, based on the security “CIA”
triumvirate:
– Confidentiality
– Availability
– Integrity
• Build these factors into your policy for protecting core systems
• Periodically conduct proactive scans
• Engage trusted experts to evaluate networks and systems.
Cybersecurity Best Practices in Financial Services
Cybersecurity Preparedness
6
1. Keep up with software patches – it doesn’t take long for hackers
to figure out what the hole is that the patch seeks to cover, and
they immediately develop tools to exploit it
2. Keep your online doors closed – many businesses do not know
how many computers they have, and sometimes they do not know
which are online. Computers that end up online when they
shouldn’t be are tempting targets for hackers; the Verizon Data
Breach Investigation Report in 2015 indicated that about 25% of
breaches were as a result of hackers getting in through a machine
that didn’t need to be online.
Cybersecurity Best Practices in Financial Services
Key Cybersecurity
Preparedness Areas
7
• People that add machines to the corporate network often do not
understand the security concerns. Many devices have default
passwords that can be found online.
• In other cases, companies have misconfigured anti-hacker
technologies to not watch traffic going in and out of such devices.
• The solution is to ensure that only necessary machines are online
and that they are protected.
3. Encrypt your data – if data is encrypted, there is not a lot that
hackers can do with it. You have to rely on technology rather than
people
4. Eliminate passwords – users hate them, security staff dread
them and hackers love them. Over 25% of breaches analyzed by
Verizon this year could have been stopped if the victimized company
required more than a password to enter its network.
Cybersecurity Best Practices in Financial Services
Key Cybersecurity Preparedness Areas (Cont’d) …
8
• Passwords are easy and can be used with any computer. Use of
tokens or biometric devices provides an added layer of protection.
5. Check out your vendors – smaller vendors and suppliers that
have access to corporate networks may not treat cybersecurity with the
same severity and urgency. Carful oversight ad vendor due diligence is
needed.
Cybersecurity Best Practices in Financial Services
Key Cybersecurity Preparedness Areas (Cont’d) …
9
1. Make the threat more personal
2. Make the protection more relevant and easy to understand
3. Reduce the number of steps
4. Provide an effective solution
5. Overcome cognitive barriers
Cybersecurity Best Practices in Financial Services
How to Increase Protection
Motivation with Staff
10
Source: Wall Street Journal Report on Information Security, April 20, 2015
1. Make the Threat More Personal
– Ask people questions that make the threat hit home (e.g., do
you want to know when someone is spying on you?)
– People are more likely to pay attention if they are prompted to
consider the possibility that their favorite retail outlet is the next
target
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
11
2. Make the Protection More Relevant and Easy to Understand:
– It is more difficult to deny threats when you can see yourself
being attacked or find out that you cannot depend on safety in
numbers
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
12
3. Reduce the Number of Steps:
– The less we do to gain security, the more likely we are to do it
– Systems could be designed so that computers do not have to
be plugged in to receive software downloads.
– Companies can reduce the need for users to act by making
antivirus software the default.
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
13
4. Provide an Effective Solution:
– When a practical solution is offered, we are more likely to
change our behavior
– E.g., the use of biometric readers - digital fingerprints are easy
and foolproof – fingerprints is hard to copy and never change.
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
14
5. Overcome Cognitive Barriers:
– The biggest barrier to cybersecurity guidelines is remembering
a random sequence of letters, numbers and symbols
– If a new password is difficult to remember, train staff to create
complex passwords they can remember, even if they are not
linked to personal information (e.g., iLove2Sleep247!)
– Pick something that makes you happy, because bundling
something positive with something negative is the best way to
make the negative thing less negative.
Cybersecurity Best Practices in Financial Services
How to Increase Protection Motivation (Cont’d) …
15
• Firms should develop a comprehensive testing strategy
• Testing should encompass both penetration testing and vulnerability
testing
• Conduct cybersecurity scenarios with the management team, via
table top “war room” exercises; they are relatively easy and cost-
effective to plan
• Think deviously when designing and planning scenario exercises!
• Penetration testing should be conducted no less than annually,
depending on the enterprise and the prevailing threat environment
• Vulnerability should be based on key controls
• Key control risks should be identified in impact analysis reviews with
the business units
Cybersecurity Best Practices in Financial Services
Cybersecurity Testing
and Preparedness
16
• The goal of penetration testing is to FIND vulnerabilities and FAIL.
• If testing illustrates that there are NO vulnerabilities, it could set a
false sense of security that “…we’re okay...”
• Design penetration tests to exploit potential vulnerabilities, tests
should look for users and/or system administrator/procedural
patterns
• Review the results of penetration testing with the senior
management team
• Develop an action plan to rectify issues that were uncovered and
further bolster the infrastructure resilience.
Cybersecurity Best Practices in Financial Services
Penetration Testing
17
• Develop an ongoing penetration test strategy – mix it up, don’t
necessarily do the same thing over and over again – the bad guys
don’t!
• Penetration test cycles should be run as long as it takes to break in
(i.e., minutes or hours)
• Tests to access applications and systems could run for days or
weeks
• Do not widely publicize that penetration testing is being conducted
to internal staff (i.e., done on a need to know basis)
• Longer duration tests should be done “off cycle” to look to exploit
key controls, client-facing applications and web-based applications.
Cybersecurity Best Practices in Financial Services
Penetration Testing (Cont’d) …
18
• Design vulnerability testing to address and potentially exploit key
controls
• Identify both known (software patches) and unknown (zero day
exploits) vulnerabilities, as well as advanced, persistent threats
• Automate vulnerability testing and scanning; by comparison,
penetration testing is relatively more manual
• Identify the top 5-10 common vulnerability exploits (CVEs) (e.g.,
Microsoft patch day)
• Uncover data changes over both long and short time periods –
subtle changes in data are difficult to detect
• Identify the “kill chain” of events that are associated with an intrusion
• Monitor network controls, patch management, privilege escalation,
containment and risk management processes; they have the biggest
potential for loopholes.
Cybersecurity Best Practices in Financial Services
Vulnerability Testing
19
• Conduct a thorough and ongoing review and inventory of all IT
assets
• Conduct ongoing screening of all systems and infrastructure for
potential vulnerabilities and threats
• Virtualize desktops, restrict/eliminate use of external media on
workstations
• Minimize workstation-to-workstation communications
• Enforce network segmentation, use DMZ controls with limitations on
privileges and access rights
• Deploy change management controls for SW/HW/NWs, operational
control structures, admin access rights
Cybersecurity Best Practices in Financial Services
Best Practice Areas
20
• Standardize and automate software patch management
• Flat network structures are more vulnerable to threats than tiered
networks
• Conduct vulnerability testing based on key controls
• Conduct iterative and progressive test initiatives
• Cooperate and share information with other firms when a cyber
incident occurs
• Develop an ongoing staff training program on cybersecurity
awareness and preparedness
• Design and conduct table top “war room” scenario planning
exercises with the management teams.
Cybersecurity Best Practices in Financial Services
Best Practice Areas (Cont’d) …
21
• The pace of cyber attacks is on the rise, and the bad actors have
become better organized, devious and smarter
• Firms need to be vigilant and proactive in their cybersecurity
preparedness, strategies and tactics
• People will continue to be the weakest links in the chain
• Keep best practices and information security standards relevant, as
long as information security controls can evolve with the changing
nature of cybersecurity threats, vulnerabilities and threats
• There is no “one size fits all” with regards to best practices.
Cybersecurity Best Practices in Financial Services
Conclusions
22
Tellefsen and Company, L.LC.
1-212 809 3800
JJR@Tellefsen.com
Cybersecurity Best Practices in Financial Services
Cybersecurity and Business
Resilience Advisory Services
23

Más contenido relacionado

La actualidad más candente

Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security ResilienceJoel Aleburu
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&AMatt Tortora
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...SurfWatch Labs
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 

La actualidad más candente (20)

Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&A
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 

Destacado

How to scale mobile application security testing
How to scale mobile application security testingHow to scale mobile application security testing
How to scale mobile application security testingNowSecure
 
Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009ClubHack
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...owaspindia
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application SecurityPrateek Jain
 
Basic Guide For Mobile Application Testing
Basic Guide For Mobile Application TestingBasic Guide For Mobile Application Testing
Basic Guide For Mobile Application TestingSourabh Kasliwal
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile ApplicationsDenim Group
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptxAnkit Giri
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Securitycclark_isec
 
Mobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android AppMobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android AppAbhilash Venkata
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Ajin Abraham
 

Destacado (13)

How to scale mobile application security testing
How to scale mobile application security testingHow to scale mobile application security testing
How to scale mobile application security testing
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009Gursev kalra _mobile_application_security_testing - ClubHack2009
Gursev kalra _mobile_application_security_testing - ClubHack2009
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Basic Guide For Mobile Application Testing
Basic Guide For Mobile Application TestingBasic Guide For Mobile Application Testing
Basic Guide For Mobile Application Testing
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android AppMobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android App
 
Security testing
Security testingSecurity testing
Security testing
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
 

Similar a Cybersecurity Best Practices in Financial Services

Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxinfosec train
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisNorth Texas Chapter of the ISSA
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance EyesOpen Association
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businessesbasilmph
 

Similar a Cybersecurity Best Practices in Financial Services (20)

Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 

Más de John Rapa

SEC Regulation SCI: Automation Review Compliance
SEC Regulation SCI:  Automation Review ComplianceSEC Regulation SCI:  Automation Review Compliance
SEC Regulation SCI: Automation Review ComplianceJohn Rapa
 
Evolution of U.S. Financial Markets 2000-2014
Evolution of U.S. Financial Markets  2000-2014 Evolution of U.S. Financial Markets  2000-2014
Evolution of U.S. Financial Markets 2000-2014 John Rapa
 
Volcker rule update 1210
Volcker rule update 1210Volcker rule update 1210
Volcker rule update 1210John Rapa
 
Swap Execution Facilities: Market Evolution and SEF Profiles
Swap Execution Facilities: Market Evolution and SEF ProfilesSwap Execution Facilities: Market Evolution and SEF Profiles
Swap Execution Facilities: Market Evolution and SEF ProfilesJohn Rapa
 
SEC Regulation SCI and Automation Review Policy Compliance
SEC Regulation SCI and Automation Review Policy ComplianceSEC Regulation SCI and Automation Review Policy Compliance
SEC Regulation SCI and Automation Review Policy ComplianceJohn Rapa
 
SEC Regulation SCI, ARP Reviews and Audits
SEC Regulation SCI, ARP Reviews and AuditsSEC Regulation SCI, ARP Reviews and Audits
SEC Regulation SCI, ARP Reviews and AuditsJohn Rapa
 
Industry impact and lessons learned from hurricane sandy summary report 010913
Industry impact and lessons learned from hurricane sandy   summary report 010913Industry impact and lessons learned from hurricane sandy   summary report 010913
Industry impact and lessons learned from hurricane sandy summary report 010913John Rapa
 
Tech Solutions For C 1104
Tech  Solutions For  C 1104Tech  Solutions For  C 1104
Tech Solutions For C 1104John Rapa
 
O Tlearing 13 Cpril 2010 0.1
O  Tlearing 13  Cpril 2010 0.1O  Tlearing 13  Cpril 2010 0.1
O Tlearing 13 Cpril 2010 0.1John Rapa
 

Más de John Rapa (9)

SEC Regulation SCI: Automation Review Compliance
SEC Regulation SCI:  Automation Review ComplianceSEC Regulation SCI:  Automation Review Compliance
SEC Regulation SCI: Automation Review Compliance
 
Evolution of U.S. Financial Markets 2000-2014
Evolution of U.S. Financial Markets  2000-2014 Evolution of U.S. Financial Markets  2000-2014
Evolution of U.S. Financial Markets 2000-2014
 
Volcker rule update 1210
Volcker rule update 1210Volcker rule update 1210
Volcker rule update 1210
 
Swap Execution Facilities: Market Evolution and SEF Profiles
Swap Execution Facilities: Market Evolution and SEF ProfilesSwap Execution Facilities: Market Evolution and SEF Profiles
Swap Execution Facilities: Market Evolution and SEF Profiles
 
SEC Regulation SCI and Automation Review Policy Compliance
SEC Regulation SCI and Automation Review Policy ComplianceSEC Regulation SCI and Automation Review Policy Compliance
SEC Regulation SCI and Automation Review Policy Compliance
 
SEC Regulation SCI, ARP Reviews and Audits
SEC Regulation SCI, ARP Reviews and AuditsSEC Regulation SCI, ARP Reviews and Audits
SEC Regulation SCI, ARP Reviews and Audits
 
Industry impact and lessons learned from hurricane sandy summary report 010913
Industry impact and lessons learned from hurricane sandy   summary report 010913Industry impact and lessons learned from hurricane sandy   summary report 010913
Industry impact and lessons learned from hurricane sandy summary report 010913
 
Tech Solutions For C 1104
Tech  Solutions For  C 1104Tech  Solutions For  C 1104
Tech Solutions For C 1104
 
O Tlearing 13 Cpril 2010 0.1
O  Tlearing 13  Cpril 2010 0.1O  Tlearing 13  Cpril 2010 0.1
O Tlearing 13 Cpril 2010 0.1
 

Último

VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Vinodha Devi
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...priyasharma62062
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Call Girls in Nagpur High Profile
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...dipikadinghjn ( Why You Choose Us? ) Escorts
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Availabledollysharma2066
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...jeffreytingson
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaipriyasharma62062
 
Top Rated Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 

Último (20)

VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
 
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
Top Rated Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 

Cybersecurity Best Practices in Financial Services

  • 2. • Cybersecurity is of increasing importance to organizations in the financial services industry • It is not clear how aware the C suite is of their enterprise’s cyber security programs, awareness of their strategy and tactics • Cyber attacks pose a great threat to organizations, many of which may not even know they have been victimized • These incursions can disrupt business, steal and/or destroy data • While many firms view cybersecurity as a technology and compliance issue; in reality it should be viewed as a core business risk • It is essential that firms are proactive in their strategies to prevent cyber attacks. • This document will describe the current state of best practices for cybersecurity within global financial services firms. Cybersecurity Best Practices in Financial Services Introduction 2
  • 3. • The highest cybersecurity concerns surround network intrusions, security breaches, the potential for theft, data corruption and reputational damage • Cyber attacks can encompass financial, technical, reputational and/or regulatory threats • There is a fine line between enforcing tight information security controls and providing robust business value • People are the weakest link in the cybersecurity chain; there is a need for ongoing cybersecurity awareness and preparedness training • Firms should identify and segment the more significant key controls, based on threat assessments (e.g., DDoS attacks, theft of data, data corruption). Cybersecurity Best Practices in Financial Services Background 3
  • 4. • Have a robust and ongoing cybersecurity test regime • Cyber testing should be designed around potential and currently unforeseen cyber incident scenarios • Conduct penetration testing of enterprise systems and client-facing systems, with penetration from both an external basis and an internal basis • Testing frameworks should be based on access to threat intelligence and staff involvement in scope and testing. Cybersecurity Best Practices in Financial Services Background (Cont’d) … 4
  • 5. • The persistent threat of cyber attacks makes managing risk a greater focus than before • To properly manage risk, firms must be proactive in their efforts to prepare for potential attack scenarios by not only being ready for them, but by actively searching for potential breaches and successfully removing them. Cybersecurity Best Practices in Financial Services Proactive Cybersecurity Risk Management 5
  • 6. • Establish policies and procedures ahead of time, so you are not improvising, should an attack occur • Gather intelligence so you can identify high impact alerts and prioritize what to tackle first • Position equipment to analyze firewalls and logs to search for anomalies • Identify your major concerns, based on the security “CIA” triumvirate: – Confidentiality – Availability – Integrity • Build these factors into your policy for protecting core systems • Periodically conduct proactive scans • Engage trusted experts to evaluate networks and systems. Cybersecurity Best Practices in Financial Services Cybersecurity Preparedness 6
  • 7. 1. Keep up with software patches – it doesn’t take long for hackers to figure out what the hole is that the patch seeks to cover, and they immediately develop tools to exploit it 2. Keep your online doors closed – many businesses do not know how many computers they have, and sometimes they do not know which are online. Computers that end up online when they shouldn’t be are tempting targets for hackers; the Verizon Data Breach Investigation Report in 2015 indicated that about 25% of breaches were as a result of hackers getting in through a machine that didn’t need to be online. Cybersecurity Best Practices in Financial Services Key Cybersecurity Preparedness Areas 7
  • 8. • People that add machines to the corporate network often do not understand the security concerns. Many devices have default passwords that can be found online. • In other cases, companies have misconfigured anti-hacker technologies to not watch traffic going in and out of such devices. • The solution is to ensure that only necessary machines are online and that they are protected. 3. Encrypt your data – if data is encrypted, there is not a lot that hackers can do with it. You have to rely on technology rather than people 4. Eliminate passwords – users hate them, security staff dread them and hackers love them. Over 25% of breaches analyzed by Verizon this year could have been stopped if the victimized company required more than a password to enter its network. Cybersecurity Best Practices in Financial Services Key Cybersecurity Preparedness Areas (Cont’d) … 8
  • 9. • Passwords are easy and can be used with any computer. Use of tokens or biometric devices provides an added layer of protection. 5. Check out your vendors – smaller vendors and suppliers that have access to corporate networks may not treat cybersecurity with the same severity and urgency. Carful oversight ad vendor due diligence is needed. Cybersecurity Best Practices in Financial Services Key Cybersecurity Preparedness Areas (Cont’d) … 9
  • 10. 1. Make the threat more personal 2. Make the protection more relevant and easy to understand 3. Reduce the number of steps 4. Provide an effective solution 5. Overcome cognitive barriers Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation with Staff 10 Source: Wall Street Journal Report on Information Security, April 20, 2015
  • 11. 1. Make the Threat More Personal – Ask people questions that make the threat hit home (e.g., do you want to know when someone is spying on you?) – People are more likely to pay attention if they are prompted to consider the possibility that their favorite retail outlet is the next target Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 11
  • 12. 2. Make the Protection More Relevant and Easy to Understand: – It is more difficult to deny threats when you can see yourself being attacked or find out that you cannot depend on safety in numbers Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 12
  • 13. 3. Reduce the Number of Steps: – The less we do to gain security, the more likely we are to do it – Systems could be designed so that computers do not have to be plugged in to receive software downloads. – Companies can reduce the need for users to act by making antivirus software the default. Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 13
  • 14. 4. Provide an Effective Solution: – When a practical solution is offered, we are more likely to change our behavior – E.g., the use of biometric readers - digital fingerprints are easy and foolproof – fingerprints is hard to copy and never change. Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 14
  • 15. 5. Overcome Cognitive Barriers: – The biggest barrier to cybersecurity guidelines is remembering a random sequence of letters, numbers and symbols – If a new password is difficult to remember, train staff to create complex passwords they can remember, even if they are not linked to personal information (e.g., iLove2Sleep247!) – Pick something that makes you happy, because bundling something positive with something negative is the best way to make the negative thing less negative. Cybersecurity Best Practices in Financial Services How to Increase Protection Motivation (Cont’d) … 15
  • 16. • Firms should develop a comprehensive testing strategy • Testing should encompass both penetration testing and vulnerability testing • Conduct cybersecurity scenarios with the management team, via table top “war room” exercises; they are relatively easy and cost- effective to plan • Think deviously when designing and planning scenario exercises! • Penetration testing should be conducted no less than annually, depending on the enterprise and the prevailing threat environment • Vulnerability should be based on key controls • Key control risks should be identified in impact analysis reviews with the business units Cybersecurity Best Practices in Financial Services Cybersecurity Testing and Preparedness 16
  • 17. • The goal of penetration testing is to FIND vulnerabilities and FAIL. • If testing illustrates that there are NO vulnerabilities, it could set a false sense of security that “…we’re okay...” • Design penetration tests to exploit potential vulnerabilities, tests should look for users and/or system administrator/procedural patterns • Review the results of penetration testing with the senior management team • Develop an action plan to rectify issues that were uncovered and further bolster the infrastructure resilience. Cybersecurity Best Practices in Financial Services Penetration Testing 17
  • 18. • Develop an ongoing penetration test strategy – mix it up, don’t necessarily do the same thing over and over again – the bad guys don’t! • Penetration test cycles should be run as long as it takes to break in (i.e., minutes or hours) • Tests to access applications and systems could run for days or weeks • Do not widely publicize that penetration testing is being conducted to internal staff (i.e., done on a need to know basis) • Longer duration tests should be done “off cycle” to look to exploit key controls, client-facing applications and web-based applications. Cybersecurity Best Practices in Financial Services Penetration Testing (Cont’d) … 18
  • 19. • Design vulnerability testing to address and potentially exploit key controls • Identify both known (software patches) and unknown (zero day exploits) vulnerabilities, as well as advanced, persistent threats • Automate vulnerability testing and scanning; by comparison, penetration testing is relatively more manual • Identify the top 5-10 common vulnerability exploits (CVEs) (e.g., Microsoft patch day) • Uncover data changes over both long and short time periods – subtle changes in data are difficult to detect • Identify the “kill chain” of events that are associated with an intrusion • Monitor network controls, patch management, privilege escalation, containment and risk management processes; they have the biggest potential for loopholes. Cybersecurity Best Practices in Financial Services Vulnerability Testing 19
  • 20. • Conduct a thorough and ongoing review and inventory of all IT assets • Conduct ongoing screening of all systems and infrastructure for potential vulnerabilities and threats • Virtualize desktops, restrict/eliminate use of external media on workstations • Minimize workstation-to-workstation communications • Enforce network segmentation, use DMZ controls with limitations on privileges and access rights • Deploy change management controls for SW/HW/NWs, operational control structures, admin access rights Cybersecurity Best Practices in Financial Services Best Practice Areas 20
  • 21. • Standardize and automate software patch management • Flat network structures are more vulnerable to threats than tiered networks • Conduct vulnerability testing based on key controls • Conduct iterative and progressive test initiatives • Cooperate and share information with other firms when a cyber incident occurs • Develop an ongoing staff training program on cybersecurity awareness and preparedness • Design and conduct table top “war room” scenario planning exercises with the management teams. Cybersecurity Best Practices in Financial Services Best Practice Areas (Cont’d) … 21
  • 22. • The pace of cyber attacks is on the rise, and the bad actors have become better organized, devious and smarter • Firms need to be vigilant and proactive in their cybersecurity preparedness, strategies and tactics • People will continue to be the weakest links in the chain • Keep best practices and information security standards relevant, as long as information security controls can evolve with the changing nature of cybersecurity threats, vulnerabilities and threats • There is no “one size fits all” with regards to best practices. Cybersecurity Best Practices in Financial Services Conclusions 22
  • 23. Tellefsen and Company, L.LC. 1-212 809 3800 JJR@Tellefsen.com Cybersecurity Best Practices in Financial Services Cybersecurity and Business Resilience Advisory Services 23

Notas del editor

  1. 1