Financial Services Technology Consortium March 18, 2008, Yale University Dan Schutzer Executive Director FSTC CyberTrust – PI meeting Unsolved Problems.

Slides:



Advertisements
Similar presentations
Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
Advertisements

IT Security Policy Framework
Vision: A strong and capable civil society, cooperating and responsive to Cambodias development challenges 1.
Proposed FMRP Course for Middle & Back Office Support Functions Foundation Module Objectives To understand the structure of Financial Markets To be aware.
Why Security? A Commitment for [the Agency’s] Executives [CIO’s name] EC Presentation [date]
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
1 1 Rules and Regulations Business Drivers for SOA-based Agile IT Presented by Adrian Bowles, Ph.D. Program Director, Regulatory Compliance Object Management.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
Managed Funds Association’s Sound Practices for Hedge Fund Managers 2009 Edition.
1 USA PATRIOT ACT 9 th Annual Factoring Conference Grand America Hotel – Salt Lake City, UT Brian J. Peretti, Esq. US Department of the Treasury Office.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
Sarbanes-Oxley, Internal Control & Cash
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
First Practice - Information Security Management System Implementation and ISO Certification.
Emerging payment systems Risks and Regulations: the way forward.
Treasury as a Strategic Partner: Creating New Value in the Organization Bob Stark – Vice President, Strategy.
® CLS and the CLS Logo are registered trademarks of CLS UK Intermediate Holdings Ltd © 2014 CLS UK Intermediate Holdings Ltd. Corporate.
Sanctions screening as a service Sibos 2010, Amsterdam Andy Schmidt, TowerGroup Nicolas Stuckens, SWIFT.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Information Security Training for Management Complying with the HIPAA Security Law.
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
Evolving IT Framework Standards (Compliance and IT)
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Stepped Up ERM Teresa McKay Director, Defense Finance and Accounting Service ASMC Washington Chapter September 17, 2008.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Citigroup Confidential Portia Workshop on Sensitive Data in Medical, Financial and Content Distribution Systems A Financial Services Viewpoint Dan Schutzer,
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Challenges and Opportunities in the Caribbean Financial Services Sector Rudolph F. Zepeda, Jr. Federal Reserve Bank of Atlanta Miami Branch.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Unit 9: Electronic Fraud Professor Thomas Genovese.
Risk and Financial Management Panel FPPA 13 th Annual Convention Sanibel Harbour – Fort Meyers, Florida February 23, 2010.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
Scott Charney Cybercrime and Risk Management PwC.
Hosted By Mike Gallagher October 2015 Risk Management And Compliance.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Legal framework Look at the legal compliance and framework a business is subject to.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
S.W.O.T. Analysis Entrepreneurship.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
E-FINANCE CHAPTER 6 RISK AND CHALLENGES Risk and Challenges, V.C joshi (2004), E-finance Log into the future, 2nd Edition, Thousand Oakes, London, E-finance:
Payment Risk Management Chip Martin Bottomline Technologies.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
Information Security Program
Regulatory Compliance
Outsource Contracting Law, Policy, & Process
Current ‘Hot Topics’ in Information Security Governance Auditing
Chapter 9 Control, security and audit
Chapter 3: IRS and FTC Data Security Rules
The Financial Services Technology Consortium
CompTIA Security+ Study Guide (SY0-401)
Federal Reserve Retail Payments Risk Forum
ARMReN Seminar Thursday, 13 September 2007
University of Maryland Robert H. Smith School of Business
Presentation transcript:

Financial Services Technology Consortium March 18, 2008, Yale University Dan Schutzer Executive Director FSTC CyberTrust – PI meeting Unsolved Problems and Issues

Financial Services Technology Consortium 2 What’s changing in US Banking? Going Global Mergers and Acquisitions Increased Regulations Payment Convergence, SEPTA Increased Threat Non-conventional competition Web 2.0 and N Gen New Revenue Opportunities Non-conventional competition

Financial Services Technology Consortium 3 Public Policy  Compliance and Regulatory reporting and monitoring  Patriot Act  Anti-Money Laundering  Sarbanes Oxley  Federal Rule of Civil Procedure (FBCP)  Regulation E and CC – payment related  Basel  Data Leakage notifications  FFEIC two factor guidance to enable financial institutions to support secure remote access.

Financial Services Technology Consortium 4 Business Processes  Steeped in tradition and bound to legacy systems  Based on paper-bound processes  Need for more checks and balances and less reliance on PII data, such as social security numbers, mothers maiden name, and account numbers  Need for innovative re-thinking on key processes such as:  Account opening  General ledger  Risk Management  Record classification  Disaster Recovery and Incident management  Auditing  Payments and Trade Processing

Financial Services Technology Consortium 5 Social Norms  Huge, global  Functional Decomposition along relatively independent product lines  Need for customer-centric integrated access to information, and cross- channel, cross-product services and features  Current behavior of employees and customers need to be more security-aware  Major emphasis on data leakage; less emphasis on more critical areas such as prevention of data tampering and service denial

Financial Services Technology Consortium 6 Data Privacy and Security  Customers rights to access information requires, easy to use, but strong encryption and access controls  Privacy often impacts security  Monitoring employees for Insider Threat  Monitor customers for anonymous behavior  Find and shutting down spoof web sites  Contradicting policies around the world  Europe, opt-in  US, opt-out  Who owns information about customer reputation?

Financial Services Technology Consortium 7 Are laws and regulations working?  Laws and regulations are reactive, not proactive  Too many regulations to comply with, often contradictory  Have trouble monitoring employees and customers from a security and fraud finding requirement  Law of unintended consequences

Financial Services Technology Consortium 8 Questions? Dan Schutzer