330 likes | 378 Views
FFIEC Cyber Security Assessment Tool. Overview and Key Considerations. Agenda. Overview of assessment tool Review inherent risk profile categories Review domain 1-5 for cyber security maturity Summary of risk/maturity relationships Overview of use case performed Final thoughts Q&A.
E N D
FFIEC Cyber Security Assessment Tool Overview and Key Considerations
Agenda • Overview of assessment tool • Review inherent risk profile categories • Review domain 1-5 for cyber security maturity • Summary of risk/maturity relationships • Overview of use case performed • Final thoughts Q&A
Benefits to Institutions • Identifying factors contributing to and determining the institution’s overall cyber risk • Assessing the institution's cybersecurity preparedness. • Evaluating whether the institutions cybersecurity preparedness is aligned with its risks • Determining risk management practices and controls that could be taken to achieve the institutions desired state of cyber preparedness • Informing risk management strategies.
Not just for Finance! • Don’t tune out if your not in the financial services sector!! • Throughout the presentation you can see that risk assessment and preparedness is a major theme in any industry. Feel free to ask particular questions about your company and industry.
Inherent Risk Profile Categories • Technologies and Connection Types • Delivery Channels • Online/Mobile Products and Technology Services • Organizational Characteristics • External Threats
Inherent Risk Profile Technologies and Connection Types Internet service providers Third party connections Internal vs outsourced hosted systems Wireless access points Network devices EOL Systems Cloud services Personal Devices
Inherent Risk Profile Delivery Channels ATM operations Online and mobile products and services delivery channels
Inherent Risk Profile Online/Mobile Products and Technology Services Credit and debit cards P2P payments ACH Wire transfers Wholesale payments Remote deposit Treasury and trust Global remittances Correspondent banking Merchant acquiring activities
Inherent Risk Profile Organizational Characteristics Mergers and acquisitions Direct employees and contractors IT environment Business presence and locations od operations and data centers
CybersecurityMaturity Overview Cybersecuritymaturity is evaluated in five domains: Domain 1 - Cyber Risk Management and Oversight, Domain 2 - Threat Intelligence and Collaboration, Domain 3 - Cybersecurity Controls, Domain 4 - External Dependency Management, Domain 5 -Cyber Incident Management and Resilience. Each domain has five levels of maturity: baseline, evolving, intermediate, advanced, and innovative.
Domain 1 Cyber Risk Management & Oversight Governance Risk Management Resources Training and Culture
Domain 2 Threat Intelligence and Collaboration Threat Intelligence Monitoring and Analyzing Information Sharing
Domain 3 Cyber Security Controls
Domain 4 External Dependency Management
Domain 5 Cyber Incident Management and Response Incident Resilience Planning & Strategy Detection, Response, & Mitigation Escalation & Reporting
Key Considerations While Using the CAT Being Innovative in CybersecurityMaturity Real time detection and response Always be updating for changes Automatic metrics and reporting Threat analytics that matter Baseline risk measurement
Not just for Finance! • Industry’s can use the tool to fit their inherent risk profile by changing the criteria that best fits them. • Eg, healthcare can tailor their inherent risk based on the nature of health services provided, number of devices connected to the network including medical devices, the number of sensitive patient files, and number of medical services locations as a start . • Same goes for the cyber security assessment maturity questionnaire, you can tailor the questionnaire using the controls for HIPAA, PCI, and NIST and any other standard that pertains to your industry.