Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.

Slides:



Advertisements
Similar presentations
The Benefits and Challenges of Implementation of Basel II in Europe José María Roldán | 27 Sept 2005.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
CYBER SECURITY in the SINGAPORE FINANCIAL SECTOR Tony Chew, Director, Technology Risk Supervision Monetary Authority of Singapore © Tel:
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
(Geneva, Switzerland, September 2014)
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15 September 2012.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Principles of Information Security, 2nd Edition1 Introduction.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
Securing Information Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Computer Security: Principles and Practice
Computer & Network Security
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Cyber Security & Fraud – The impact on small businesses.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Recent Cyber Attacks and Countermeasures September 2006.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Scott Charney Cybercrime and Risk Management PwC.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
1 I ntegrated S ite S ecurity for G rids WP2 – Site Assessment Methodology, 20 June 2007 WP2 - Methodology ISS e G Integrated Site Security.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
IS3220 Information Technology Infrastructure Security
Information Security tools for records managers Frank Rankin.
E-FINANCE CHAPTER 6 RISK AND CHALLENGES Risk and Challenges, V.C joshi (2004), E-finance Log into the future, 2nd Edition, Thousand Oakes, London, E-finance:
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Securing Information Systems
Securing Information Systems
Risk management.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Team 1 – Incident Response
Security Standard: “reasonable security”
Information Technology Sector
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Information Security based on International Standard ISO 27001
I have many checklists: how do I get started with cyber security?
Join In Be Secure Presentation
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Intrusion Detection system
Web Information Systems Engineering (WISE)
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September 10, 2003 Hugh Kelly Special Advisor for Global Banking Office of the Comptroller of the Currency

Comptroller of the Currency Administrator of National Banks What is Electronic Security?  Any tool, technique, or process that protects a system’s information assets from threats to confidentiality, integrity, or availability  E-security is composed of:  Soft infrastructure – policies, procedures, processes & protocols that protect the system & data from compromise  Hard Infrastructure – hardware & software used to protect the system & data from threats to security from inside & outside

Comptroller of the Currency Administrator of National Banks Why is E-Security Important?  Greater reliance on technology increases potential for & likely impact of e-security threats  By 2005, online banking will be over 50% in industrial countries & 10% in emerging markets  Growing global connectivity through distributed networks, broadband & wireless connections  Most types of e-crimes are not new  New dimensions of security threats due to networks & e-banking

Comptroller of the Currency Administrator of National Banks Changing Nature of E-Threats  External:  Speed & sophistication of cyber-attacks  Hackers are smarter & better organized  Blended threats & hybrid attacks  Critical infrastructure reliance on Internet  Cross-border nature of cyber-attacks  Internal:  Security not well understood by Board & management nor a high priority  Misconfigured or outdated systems, mail programs or web sites lead to vulnerabilities  Security holes in mobile & wireless networks  Use of generic off-the-shelf software  Just one naïve user with easy-to-guess password increases risk

Comptroller of the Currency Administrator of National Banks Possible Effects of a Cyber Attack  Denial-of-service  Unauthorized use or misuse of computing systems  Loss/alteration/compromise of data or software  Monetary/financial loss  Loss or endangerment of human life  Loss of trust in computer/network system  Loss of public confidence

Comptroller of the Currency Administrator of National Banks Proactive & Multi-Layered Risk Mitigation Framework  Need for broader adoption of proactive e-security risk mitigation processes  Help identify & manage threats  Meet business & customer expectations  Preserve public trust  Caveat -- E-security framework must be multi-layered & dynamic  Changing risk profiles  People, processes & technology issues

Comptroller of the Currency Administrator of National Banks E-Security Risk Control Progam  Need awareness at Boardroom level  Direct business impact  Linkage to standards demanded by regulators, shareholders & customers  Apply Basel EBG e-banking risk management principles:  Active oversight by Board & management  Robust e-security risk control policy/program  Authentication & authorization  Data access controls, encryption & recovery  Intrusion detection, integrity checking & incident response procedures  Consider operational risk impact

Comptroller of the Currency Administrator of National Banks Supervisory Actions  Need more focus globally on enhancing e-security supervision & examination  Many individual bank supervisors are developing:  Modern e-security risk management standards for their banks  Integrated IT/safety & soundness examination procedures  Better incident reporting & analysis  Business continuity/disaster recovery plans (public/private sector scope)

Comptroller of the Currency Administrator of National Banks Conclusion: What Can We Do Together?  Enhance global supervisory cooperation on e-security issues  Promote e-security risk management principles & best practices  Information exchange on incidents, threat vulnerability assessments & risk mitigation needs  Supervisory policy development, including examination approaches to cyber & IT risks  Examiner training  Public alerts & education