E N D
1. Critical Data Protection Strategies for Financial Institutions Moderator:
Shelley Leonard
Director, Business Architecture
Fidelity National Information Services
Panelists:
John Simon
VP, Client Services Technology Initiatives
Land America Financial Group
Doug Woods
EVP, Technology
EverBank
2. Protecting your Customers from Identity Theft Presented by:
Shelley Leonard
Director, Business Architecture
Fidelity National Information Services
5. The Challenge Protecting customer and company data that we:
Acquire
Consume
Publish
Pertinent Legislation:
U.S. FCRA
CA Senate Bill (SB) 1386
Identity Theft Penalty Enhancement Act
CA Assembly Bill (AB) 1950
FFIEC Guidance on risk management controls and authentication of customers accessing Web-based financial services
Protecting customer data is much less expensive than dealing with a security breach in which records are exposed and potentially misused. U.S. FCRA – Provisions added to combat identity theft, including giving consumers annual free copies of their credit reports, barring merchants from printing complete credit card numbers on receipts and placing an automatic "fraud alert" on at-risk credit files.
CA Senate Bill (SB) 1386 – Requires businesses to immediately notify CA residents of a breach or suspected compromise of the residents' unencrypted personal information.
Identity Theft Penalty Enhancement Act – Adds two years to prison sentences for criminals convicted of using stolen credit card numbers and other personal data to commit crimes
CA Assembly Bill (AB) 1950 – Requires any business that holds information about CA residents to maintain "reasonable security procedures and practices appropriate to the nature of the information" to protect this information from unauthorized use or disclosure.
FFIEC – Updated its guidance on risk management controls and authentication of customers accessing Web-based financial services. The guidance supports a risk-based approach to managing transactions and recommends banks implement authentication technologies that match the risk of their applications.
U.S. FCRA – Provisions added to combat identity theft, including giving consumers annual free copies of their credit reports, barring merchants from printing complete credit card numbers on receipts and placing an automatic "fraud alert" on at-risk credit files.
CA Senate Bill (SB) 1386 – Requires businesses to immediately notify CA residents of a breach or suspected compromise of the residents' unencrypted personal information.
Identity Theft Penalty Enhancement Act – Adds two years to prison sentences for criminals convicted of using stolen credit card numbers and other personal data to commit crimes
CA Assembly Bill (AB) 1950 – Requires any business that holds information about CA residents to maintain "reasonable security procedures and practices appropriate to the nature of the information" to protect this information from unauthorized use or disclosure.
FFIEC – Updated its guidance on risk management controls and authentication of customers accessing Web-based financial services. The guidance supports a risk-based approach to managing transactions and recommends banks implement authentication technologies that match the risk of their applications.
6. Multifaceted, Multichannel Crimes Just as thieves use multiple online and offline methods to steal information, they also use multiple channels to access consumer bank and credit card accounts to rob the money. According to Gartner clients, fraudsters are increasingly combining online and offline techniques and channels to accomplish their goals. For example, they may "phish" for online bank account user IDs and passwords, log on to a consumer's online bank account, look at the check images, and record the check numbering scheme and signature, then use these in check forgery schemes. Or they may steal ATM card and PIN numbers through keyboard logging spyware planted on a consumer's PC, then use the numbers to counterfeit ATM cards that are used to illegally withdraw money from consumer bank accounts. A key problem is that there are many "doors" to consumer bank and credit accounts, and many online and offline methods for stealing data to gain access to them. The consumer's financial institutions are not directly responsible for keeping all these doors properly locked. Therefore, the responsibility for theft prevention is diffused among many service providers, including Internet service providers, e-mail providers, banks, card companies, merchants, billers, payment processors, auction sites and other companies. In the electronic information and shopping age, bank and card account numbers are stored in many places. Measures for securing one site, such as an online banking site, will do nothing to secure a bank account number stored by a utility company and used to automatically pay a consumer's monthly electric bill.Just as thieves use multiple online and offline methods to steal information, they also use multiple channels to access consumer bank and credit card accounts to rob the money. According to Gartner clients, fraudsters are increasingly combining online and offline techniques and channels to accomplish their goals. For example, they may "phish" for online bank account user IDs and passwords, log on to a consumer's online bank account, look at the check images, and record the check numbering scheme and signature, then use these in check forgery schemes. Or they may steal ATM card and PIN numbers through keyboard logging spyware planted on a consumer's PC, then use the numbers to counterfeit ATM cards that are used to illegally withdraw money from consumer bank accounts. A key problem is that there are many "doors" to consumer bank and credit accounts, and many online and offline methods for stealing data to gain access to them. The consumer's financial institutions are not directly responsible for keeping all these doors properly locked. Therefore, the responsibility for theft prevention is diffused among many service providers, including Internet service providers, e-mail providers, banks, card companies, merchants, billers, payment processors, auction sites and other companies. In the electronic information and shopping age, bank and card account numbers are stored in many places. Measures for securing one site, such as an online banking site, will do nothing to secure a bank account number stored by a utility company and used to automatically pay a consumer's monthly electric bill.
7. Escalation of Online Fraud Will Lead to a Solution Revolution 9.4 million online U.S. adults were victimized by identity theft in year ending April 2004
Losses amounted to $11.7 billion
Online theft is escalating
The solution revolution:
ISPs and others will provide automated desktop protection tools
Holistic back-end fraud-detection systems will roll out to U.S. FIs
By YE07, up to 75 percent of U.S. banks and up to 70 percent worldwide will use authentication methods stronger than passwords and less expensive than hardware tokens (0.7 probability). According to a Gartner survey of 5,000 online U.S. adults in April 2004, more than $11.7 billion was lost to fraud among online U.S. adults from May 2003 to April 2004. (Approximately 70 percent of U.S. adults are online.) Although information stolen over the Internet leads to the most-prevalent types of fraud, the crimes are perpetrated using multiple online and offline methods and channels, which makes them more difficult to prevent and catch. An estimated 9.4 million online adults were victimized by financial fraud in the past year. (Yearly estimates refer to the 12-month period ending April 2004.)
Usually, the criminals get away. According to the consumers surveyed by Gartner, the category with the most arrests was check forgery, probably because the police are experienced at pursuing stolen-check paper trails.
These phenomena will lead to a solution revolution. By year-end 2007, up to 75 percent of U.S. banks and up to 70 percent worldwide will use authentication methods stronger than passwords and less expensive than hardware tokens (0.7 probability). By year-end 2007, up to 7 percent of banks in the U.S. and 50 percent to 70 percent worldwide will have forced their customers to authenticate using hardware tokens (0.7 probability). Multichannel, multi-account, back-end fraud detection systems will roll out to 30 percent of U.S. financial institutions by the end of 2007 (0.7 probability).According to a Gartner survey of 5,000 online U.S. adults in April 2004, more than $11.7 billion was lost to fraud among online U.S. adults from May 2003 to April 2004. (Approximately 70 percent of U.S. adults are online.) Although information stolen over the Internet leads to the most-prevalent types of fraud, the crimes are perpetrated using multiple online and offline methods and channels, which makes them more difficult to prevent and catch. An estimated 9.4 million online adults were victimized by financial fraud in the past year. (Yearly estimates refer to the 12-month period ending April 2004.)
Usually, the criminals get away. According to the consumers surveyed by Gartner, the category with the most arrests was check forgery, probably because the police are experienced at pursuing stolen-check paper trails.
These phenomena will lead to a solution revolution. By year-end 2007, up to 75 percent of U.S. banks and up to 70 percent worldwide will use authentication methods stronger than passwords and less expensive than hardware tokens (0.7 probability). By year-end 2007, up to 7 percent of banks in the U.S. and 50 percent to 70 percent worldwide will have forced their customers to authenticate using hardware tokens (0.7 probability). Multichannel, multi-account, back-end fraud detection systems will roll out to 30 percent of U.S. financial institutions by the end of 2007 (0.7 probability).
9. Areas of Focus
10. Option 1 – Do Nothing Assumes status quo is “good enough” protection for your customers and the probability of data being compromised is low
Data in Flight is left in the clear and media being transported is entrusted to the carriers
At best, Data at Rest is monitored and reported if accessed improperly
What is at Stake for Lenders and Service Providers?
Reputation
Media Exposure
Cost of Remediation
Shareholder Value
Compliance Penalties
Board of Directors, Officers and Managers Liability
Customer Retention
Customer Satisfaction
Revenue
Market Share
11. Option 2 – Risk Based Solutions Secure+ is a Sterling product used to encrypt NDM transmissions
Secure FTP can either be SFTP (over SSH) or FTPS
PGP - Pretty Good Privacy (PGP) is a computer program which provides cryptographic privacy and authentication. File level encryption requiring the exchange of keys by sender and receiver.
SecureZip – PKWare product for compressing and encrypting files on mainframe or PCs
Laptop encryption products all support full disk encryption including swap file and boot sectorsSecure+ is a Sterling product used to encrypt NDM transmissions
Secure FTP can either be SFTP (over SSH) or FTPS
PGP - Pretty Good Privacy (PGP) is a computer program which provides cryptographic privacy and authentication. File level encryption requiring the exchange of keys by sender and receiver.
SecureZip – PKWare product for compressing and encrypting files on mainframe or PCs
Laptop encryption products all support full disk encryption including swap file and boot sectors
12. Option 3 – Encrypt All Data
13. Industry perspective on information security shifting…
14. A Multipronged Approach Is Needed Back-end fraud detection systems make sense when the volume is too high to check transactions manually, or when actual or potential fraud losses are higher than the costs of a detection system. There are several packaged solutions for online retail transactions, but most large merchants find that their homegrown systems are more effective as stand-alone solutions or when used in conjunction with purchased solutions. For new-account applications at financial services companies or other creditors, such as wireless service providers, scoring systems that detect patterns of suspicious behavior across industries are most effective. For credit card and checking account transactions, banks and card issuers have a range of rule-based and scoring solutions to choose from, but systems that protect checking accounts are less effective than those that protect card transactions, partly because there are not as many data elements on check transactions to work with automatically. There is a need for more-effective fraud detection that looks at customer accounts and behavior holistically — that is, across channels, industries and accounts. Strong authentication makes sense where a strong feeling of community exists and is desirable for commerce, or where regulatory environments demand authentication beyond passwords. Defining how transactions occur is the first decision point for choosing the appropriate strong authentication approach. For online transactions, the availability of input devices at all locations where commerce will be conducted is the key decision point. The last decision point is a straightforward return on investment analysis.Back-end fraud detection systems make sense when the volume is too high to check transactions manually, or when actual or potential fraud losses are higher than the costs of a detection system. There are several packaged solutions for online retail transactions, but most large merchants find that their homegrown systems are more effective as stand-alone solutions or when used in conjunction with purchased solutions. For new-account applications at financial services companies or other creditors, such as wireless service providers, scoring systems that detect patterns of suspicious behavior across industries are most effective. For credit card and checking account transactions, banks and card issuers have a range of rule-based and scoring solutions to choose from, but systems that protect checking accounts are less effective than those that protect card transactions, partly because there are not as many data elements on check transactions to work with automatically. There is a need for more-effective fraud detection that looks at customer accounts and behavior holistically — that is, across channels, industries and accounts. Strong authentication makes sense where a strong feeling of community exists and is desirable for commerce, or where regulatory environments demand authentication beyond passwords. Defining how transactions occur is the first decision point for choosing the appropriate strong authentication approach. For online transactions, the availability of input devices at all locations where commerce will be conducted is the key decision point. The last decision point is a straightforward return on investment analysis.
15. Working to Secure the Future MBA, MISMO and SISAC
John D. Simon
Vice President, Client Services Technology Initiatives
Chair, MISMO Information Security Workgroup
16. Disclaimers & Credits Disclaimers
The information in this presentation is educational in nature.
General information about legal developments is included, but it is not legal advice.
Consult an attorney for any specific legal questions.
Credits
To Nancee Gorenstein, Mike Fleck, Dick Taylor and the other ISWG members that contributed so much time and effort to the year-long effort to develop the ISWG White Paper, Identifying and Safeguarding Personal Information: Recommended Guidelines and Practices.
To Yuriy Dzambasow and his employer, A&N Associates, Inc., who contributed to MISMO their methodology for developing a comprehensive and complete information assurance solution.
To Robert Schlecht, the MBA staff liaison to the ISWG, who has provided essential insight, support and guidance.
17. Historical Perspective
MBA Board of Directors Technology Steering Committee – www.MBAA.org
October, 2005
Protecting Personal Information: The Good, the Bad, the Ugly
http://www.MortgageBankers.org/documents/NewsLink/Misc/102705security.pdf
MISMO: Information Security Work Group – www.MISMO.org
MBA wholly-owned, nonprofit subsidiary
February, 2006
Identifying and Safeguarding Personal Information: Recommended Guidelines and Practices
http://www.MISMO.org/files/mismo/InformationSecurityWhitepaper.pdf
SISAC (Secure Identity Services Accreditation Corporation) – www.SISAC.org
MBA wholly-owned, nonprofit subsidiary
Establishing a mortgage industry PKI “federation”
December, 2003
KPMG: first accredited auditor for identity management compliance
January, 2004
VeriSign: first accredited issuer of digital credentials
18. State Privacy Breach Notification Legislation
19. Federal Privacy Breach Notification Legislation H.R. 3997 - Financial Data Protection Act of 2005
Key Provisions
Preempts state legislation.
Standardizes data protection standards.
Requires policies and procedures to protect personal information.
Requires immediate investigation of any reasonable potential breach.
If consumers may be harmed or inconvenienced by breach, law enforcement, regulator(s), and other businesses in transaction chain must be notified.
If financial fraud against consumers may result from breach, consumers must be notified via mail and must be offered free credit monitoring.
Consumers who have been a victim of identity theft may freeze their credit reports.
FTC to maintain a public list of breaches that resulted in consumer notification within last twelve months.
FTC to provide voluntarily supplied information on race and ethnicity of victims of data theft and account fraud.
Credit monitoring activities are exempted from the Credit Repair Organization Act.
20. Federal Privacy Breach Notification Legislation (continued) H.R. 3997 - Financial Data Protection Act of 2005
Current Status
Approved by House Financial Services Committee on March 16, 2006.
Strongly opposed by consumer groups and privacy advocates.
Would preempt stronger state laws already in place.
Would give companies too much discretion in disclosing breaches.
Would not regulate activities of data aggregators such as ChoicePoint.
Would prevent consumers from freezing their credit reports prior to identity theft (consumers would first have to be victims of identity theft).
Next Steps
Full House must vote.
Companion Senate bill required.
21. Implementing a Phased-in Security Program
22. MISMO Five Step Model in Practice
23. Best-In-Class Approaches to Data Security Adhere to Authoritative Guidelines and Practices
ANSI (American National Standards Institute)
BITS (fka Banking Industry Technology Secretariat)
CIO Executive Council
COPP (California Office of Privacy Protection)
IEC (International Electrotechnical Commission)
IETF (Internet Engineering Task Force)
ISACA (Information Systems Audit and Control Association)
ISO (International Standards Organization)
NIST (National Institute of Science and Technology)
SEI (Software Engineering Institute)
SISAC (Secure Identity Services Accreditation Corporation)
24. Best-In-Class Approaches to Data Security Incident Response Plan
Recommendations and are based on:
California Office of Privacy Protection (COPP)
NIST SP 800-61
At a minimum, incident response plans should include:
Monitoring and notification
Impact assessment of the security incident
Internal notification procedures
External notification procedures
Follow-up assessment to mitigate the security incident from recurring
Updates to incident response plans
25. Best-In-Class Approaches to Data Security Incident Response Plan (continued)
Should also identify specific individuals responsible for plan execution and management
Central Incident Response Team (one team)
Handles incidents throughout an organization
Effective for small organizations and for large organizations with centralized IT
Distributed Incident Response Teams (multiple teams)
Each handles incidents for a particular logical or physical segment of the organization
Effective for large organizations or organizations with major distributed computing resources
Teams should be part of a centralized entity so that response is consistent across the organization
Coordinating Team
Provides guidance and advice to distributed teams without authority over them
Improves consistency and information sharing among teams
26. Mortgage Industry PKI Federation Business Drivers Sarbanes–Oxley (SOX)
Strengthen Corporate financial governance; restore investor confidence
Applies to public companies; adhered to by an increasing number of private companies
Gramm-Leach-Bliley Act (GLBA)
Protect privacy rights of customers; ensure security of non-public personal information
Applies to Financial Services industry and many of their service providers
State Privacy Breach Notification Legislation (Enacted and Pending)
Define non-public personal information (PI); stipulate conditions for notifications
Applies to most public, private and governmental organizations
Federal Privacy Breach Notification Legislation (Pending)
Preempts state legislation
Applies to most public, private and governmental organizations
27. A Look Toward the Future Labeling of Personal Information in MISMO Logical Data Dictionary
Security and Privacy sections in MISMO Implementation Guides
Standard security practices for Web Services and AS2
Periodic updates to ISWG White Paper and State Legislation Matrix
Drive to establish mortgage industry PKI federation via SISAC
28. EverBankSecurity Presentation Doug Woods
March 31, 2006
29. Mission
Safeguard Customer Information
and
promote secure and reliable operations of information systems
30. Objectives Ensure the security and confidentiality of customer information
Protect against any anticipated threats or hazards to the security and integrity of the information and systems
Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer or system
31. What Are We Protecting? EverBank’s Customers & Business Partners
34. Security Considerations – Third-Parties Vulnerabilities
Security program
Financial condition
BR/DR plan Controls
Third-party reviews
35. Security Considerations – Physical Vulnerabilities
Facility access
High security area access
Visitors
“Clean desk”
Power
Controls
Access controls
Visitor pass & registration
Security guards
Locked files, offices, desks
Cameras
Generators
36. Security Considerations – Users Vulnerabilities
Accidents
Dishonesty
Controls
Interviews
Background checks
Authentication
Termination management
Forensic software
37. Security Considerations – Network Vulnerabilities
Viruses
Denial of service
Packet sniffing
Email spoofing
Controls
OSI 7-Layer controls
Intrusion detection
Penetration testing
38. Security Considerations – Applications Vulnerabilities
Application vulnerabilities
Unauthorized access
Weak design
Poor coding
Backdoor
Controls
Patch management
Authentication
Testing
Code reviews
39. Security Considerations – Operating Systems Vulnerabilities
OS vulnerabilities
Controls
Patch management
Antivirus software
Identification and authorization
40. Security Considerations – Data Vulnerabilities
Personally Identifiable Information
Static
In-transit
Controls
Education and training
Encryption
Databases
Backups
Laptops
41. OSI 7-Layer Framework Open System Interconnection
Established in 1983, OSI is a "reference model" that explains how two points in a telecommunication network transmit messages.
OSI defines seven layers of functionality that take place at each end of a communication. Control is passed from one layer to the next, starting at the Application Layer in one system; proceeding to the bottom layer of that system; passing over a channel to the next system; and moving backup the hierarchy.
43. http://www.pdaconsulting.com/csaudit.htm
Application Layer: where user authentication and privacy are considered, and where communication partners, quality of service and constraints on data syntax are identified.http://www.pdaconsulting.com/csaudit.htm
Application Layer: where user authentication and privacy are considered, and where communication partners, quality of service and constraints on data syntax are identified.
44. http://www.pdaconsulting.com/csaudit.htm
http://www.pdaconsulting.com/csaudit.htm
45. http://www.pdaconsulting.com/csaudit.htm
Session Layer: sets up, coordinates and terminates conversations, exchanges and dialogs between the applications at each end. It deals with session and connection coordination.http://www.pdaconsulting.com/csaudit.htm
Session Layer: sets up, coordinates and terminates conversations, exchanges and dialogs between the applications at each end. It deals with session and connection coordination.
46. http://www.pdaconsulting.com/csaudit.htm
Transport Layer: manages end-to-end control--determining, for example, whether all packets have arrived--as well as performs error checking. It ensures complete data transfer. This layer provides process-to-process communication, and may add other end-to-end services like reliability http://www.pdaconsulting.com/csaudit.htm
Transport Layer: manages end-to-end control--determining, for example, whether all packets have arrived--as well as performs error checking. It ensures complete data transfer. This layer provides process-to-process communication, and may add other end-to-end services like reliability
47. http://www.pdaconsulting.com/csaudit.htm
Network Layer: handles the routing or forwarding of the data. Layer 3 provides host-to-host communication and defines the basic unit of transfer or packet, network level addressing and possibly routing.http://www.pdaconsulting.com/csaudit.htm
Network Layer: handles the routing or forwarding of the data. Layer 3 provides host-to-host communication and defines the basic unit of transfer or packet, network level addressing and possibly routing.
48. http://www.pdaconsulting.com/csaudit.htm
Data Link Layer: ensures that everything physically sent was physically received. It provides error control and synchronization for the physical layer, and is responsible for grouping bits into frames and moving them from one node to another. The data link layer may define hardware addresses http://www.pdaconsulting.com/csaudit.htm
Data Link Layer: ensures that everything physically sent was physically received. It provides error control and synchronization for the physical layer, and is responsible for grouping bits into frames and moving them from one node to another. The data link layer may define hardware addresses
49. http://www.pdaconsulting.com/csaudit.htm
Physical Layer: is responsible for moving raw bits from one node to another, transporting the bit stream through the network at the electrical and mechanical level. At this layer, are such devices as repeaters and hubs. Cabling media and topology present key considerations for review.http://www.pdaconsulting.com/csaudit.htm
Physical Layer: is responsible for moving raw bits from one node to another, transporting the bit stream through the network at the electrical and mechanical level. At this layer, are such devices as repeaters and hubs. Cabling media and topology present key considerations for review.
51. Policies and Procedures Security Program Policy
Security Policy
Third-Party Regulation Policy
Computer Attack Response Procedure
Termination Access Control Procedures (both physical and system)
52. Secure Email Mail gateway / content encryption
Lexicon – key word search with actions
Email encryption
Mail encryption
Client delivery
Web-based
Software client-based
Multi-domain encryption delivery
VMWare
53. Encryption Backup (tape) encryption issues
Performance
Key recovery
Laptop encryption
Lost or stolen computer equipment
Database encryption
Inline encryption – on the wire
Field, table, and scheme
Encryption is a “must have” to prevent data theft from lost or stolen media
54. Forensic Software A forensic system acts as a security camera and motion detector system for our network. It is continuously capturing and storing information in a database warehouse for future reports and analysis.
Advantages of Forensics
Playback of security incident
Evidence in a court of law
Strong deterrent for individuals inside the company to commit fraud