Download presentation
Presentation is loading. Please wait.
Published byIrma Hawkins Modified over 8 years ago
1
February 2, 2016 | Chicago NFA Cybersecurity Workshop
2
Background and overview NFA Cybersecurity Interpretive Notice ISSP policy development Resources: Audio from this conference will be available on NFA’s website in mid-February Expert panel: Lessons learned NFA panel: What to expect during NFA's exam process Questions Today’s Agenda
3
Members may use electronic means to: Collect and maintain customer information, including personally identifying information (PII) Enter customer, counterparty and proprietary orders Websites available to customers and counterparties for: Opening accounts Trading Accessing account information Technology is Everywhere
4
Daily reports of cybersecurity attacks Hackers Phishing attempts Internal breaches Cybersecurity is everyone’s responsibility Necessary to take measures to protect firms, customers, and the industry Cybersecurity Affects Everyone
5
Members should have supervisory practices in place reasonably designed to Diligently supervise the risks of unauthorized access or attack of their IT systems Respond accordingly should unauthorized access or an attack occur Regulatory Objective
6
Interpretive Notice to NFA Compliance Rules 2-9, 2-36 and 2- 49 entitled Information Systems Security Programs Development: Much research and input from: Members, other regulators, cybersecurity experts NFA Advisory committees Reviewed and approved by NFA Executive Committee and Board of Directors Submitted to CFTC in August 2015 Approved by the CFTC in October 2015 Effective March 1, 2016 Background & Development
7
Requires Member firms to adopt and enforce written policies and procedures to secure customer data and access to their electronic systems tailored to their specific business activities and risk Background & Development
8
Differences in type, size and complexity of Members’ businesses No one-size-fits-all solution Appropriate degree of flexibility to determine how to best diligently supervise information security risks NFA established general requirements relating to Members’ information systems security programs (ISSP) Member firms should adopt and tailor the guidance in NFA’s interpretive notice to their particular business activities and risks NFA’s policy is not to establish specific technology requirements Principles-Based Risk Approach
9
Requires Member firms to adopt and enforce written policies and procedures to secure customer data and access to their electronic systems tailored to their specific business activities and risk Key areas: Governance Security and risk analysis Deployment of protective measures Response and recovery Employee training Third-party service providers Recordkeeping ISSP Development
10
Governance framework supports informed decision making and escalation within the firm to identify and manage security risks ISSP must be approved within Member firms by an executive-level official Board engagement as applicable Monitor and review effectiveness of ISSP regularly—at least once every 12 months—and adjust as appropriate Governance
11
Supervisory obligation to assess and prioritize risks associated with the use of IT systems Maintain an inventory of critical IT hardware with network connectivity, data transmission or storage capability, and critical software Identify significant internal and external threats and vulnerabilities to at-risk data, including customer and counterparty PII, corporate records and financial information. Steps may include: Utilize network monitoring software Watch for unauthorized users on physical premises Become members of threat/data sharing organizations such as the Financial Services Information Sharing and Analysis Center (FS-ISAC) Security and Risk Analysis
12
Assess threats to and vulnerability of electronic infrastructure and threats posed through third-party services or software Know the devices connected to the network Estimate the severity of potential threats Perform a vulnerability analysis Decide how to manage the risk of these threats Security and Risk Analysis
13
Document and describe the safeguards deployed in light of identified system threats and vulnerabilities 15 safeguard examples outlined in Interpretive Notice, including: Access controls to systems and data Complex passwords Firewall and anti-virus software Software updates and current operating systems Backing up data regularly Encryption Network segmentation Web filtering technology Safeguard mobile devices Deployment of Protective Measures
14
Create an incident response plan to provide a framework to: Manage detected security events or incidents Analyze their potential impact Take appropriate measures to contain and mitigate their threat Consider sharing details of any detected threats to an industry- specific information-sharing platform such as FS-ISAC Procedures to restore compromised system and data Communicate with appropriate stakeholders and regulators Incorporate lessons learned into the ISSP Response and Recovery
15
Description of ongoing education and training for all appropriate personnel Conducted for employees upon hiring Conducted periodically during employment Appropriate to security risks Members face and composition of their workforce Employee Training
16
Address risks posed by third-party service providers Perform due diligence on critical third-party service providers’ security practices Consider procedures to allow appropriate access and terminate access once the provider is no longer providing service Third-Party Service Providers
17
Maintain all records relating to: A Member’s adoption and implementation of an ISSP a Member’s compliance with the Cybersecurity Interpretive Notice Recordkeeping
18
Developed to assist firms in meeting their obligations related to ISSPs Covers key areas of Interpretive Notice Not intended to replace written ISSP Expertise required to develop written ISSP should also be considered Self-Exam Questionnaire
19
NFA Interpretive Notice: http://www.nfa.futures.org/news/PDF/CFTC/InterpNotc_CR2-9_2- 36_2-49_InfoSystemsSecurityPrograms_Aug_2015.pdf http://www.nfa.futures.org/news/PDF/CFTC/InterpNotc_CR2-9_2- 36_2-49_InfoSystemsSecurityPrograms_Aug_2015.pdf NFA Notice to Members: http://www.nfa.futures.org/news/newsNotice.asp?ArticleID=4649 http://www.nfa.futures.org/news/newsNotice.asp?ArticleID=4649 NIST Framework for Improving Critical Infrastructure Cybersecurity: http://www.nist.gov/cyberframework/upload/cybersecurity-framework- 021214.pdf http://www.nist.gov/cyberframework/upload/cybersecurity-framework- 021214.pdf SANS Institute: http://www.sans.org/http://www.sans.org/ FINRA Report on Cybersecurity Practices: http://www.finra.org/file/report- cybersecurity-practiceshttp://www.finra.org/file/report- cybersecurity-practices FS-ISAC: http://www.fsisac.com/http://www.fsisac.com/ Resources
20
CYBERSECURITY EXPERT PANEL
21
Amy McCormick Moderator (NFA) Patricia Donahue Rosenthal Collins Group LLC Buddy Doyle Oyster Consulting Peter Salmon Investment Company Institute Panelists
22
WHAT TO EXPECT DURING AN EXAM
23
Any programs that are adopted will be refined over time Incremental approach Review ISSP for expected components and overall reasonableness Obtain high-level understanding of the firm’s preparedness against cybersecurity risks Perform additional work as needed What to expect during an exam
24
Contact Us If you have questions or would like more information, please contact NFA. Shuna AwongPatricia Cushing 212-513-6057312-781-1403 sawong@nfa.futures.orgsawong@nfa.futures.org pcushing@nfa.futures.orgpcushing@nfa.futures.org Amy McCormickDale Spoljaric 312-781-7438312-781-7415 amccormick@nfa.futures.orgdspoljaric@nfa.futures.org
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.