Security Program and
Policies
Principles and Practices
by Sari Stern Greene
Chapter 13: Regulatory Compliance for Financial Institutions
Copyright 2014 Pearson Education, Inc. 2
Objectives
■ Explain financial institution information
security regulatory compliance
requirements
■ Understand the components of a GLBA-
compliant information security program
■ Prepare for a regulatory examination
■ Respond to the twin threats of personal
identity theft and corporate account
takeover
Copyright 2014 Pearson Education, Inc. 3
Introduction
■ A financial institution’s most significant asset
is not money: It’s information about money,
transactions and customers
■ Protection of those information assets is
necessary to establish the required trust for
the institution to conduct business
■ Institutions have a responsibility to protect
their client’s information and privacy from
harm such as fraud and ID theft
Copyright 2014 Pearson Education, Inc. 4
The Gramm-Leach-Bliley Act
(GLBA)
❑ Signed into law by President Clinton in 1999
❑ Also known as the Financial Modernization Act of
1999
❑ Meant to allow banks to engage in a wide array of
financial services
❑ Banks can now merge with stock brokerage
companies and insurance companies, which
means that they can possess large amounts of
private, personal client information
Copyright 2014 Pearson Education, Inc. 5
The Gramm-Leach-Bliley Act
(GLBA) Cont.
❑ Title 5 of the GLBA specifically addresses
protecting both the privacy and the security of
non-public personal information (NPPI)
■ Privacy Rule
❑ Limits the financial institutions disclosure of NPPI to
unaffiliated third parties
■ Security Guidelines
❑ Address safeguarding the confidentiality and security of
customer NPPI and ensuring proper disposal of NPPI
Copyright 2014 Pearson Education, Inc. 6
The Gramm-Leach-Bliley Act
(GLBA) Cont.
❑ What is NPPI?
■ Stands for non-public personal information
■ Includes the following information:
❑ Names
❑ Addresses
❑ Phone numbers
❑ Income and credit histories
❑ Social Security numbers
Copyright 2014 Pearson Education, Inc. 7
What Is a Financial Institution?
■ Financial institution is “Any institution the business of
which is significantly engaged in financial activities as
described in Section 4(k) of the Bank Holding Company
Act (12 U.S.C. § 1843(k).”
■ GLBA also applies to companies that provide financial
products and/or services such as:
❑ Automobile dealers
❑ Check-cashing businesses
❑ Consumer reporting agencies
❑ Courier services
❑ Debt collectors
Copyright 2014 Pearson Education, Inc. 8
Regulatory Oversight
■ Seven federal agencies and the states have authority to
administer and enforce the Financial Privacy Rule and
Section 501(b)
■ Which agency is tasked with enforcing the regulation,
along with the severity of the penalty, is dependent upon
the industry to which the business belongs
■ Nontraditional financial services companies are
regulated by the FTC but are not subject to scheduled,
regular audits unless a complaint has been lodged
against them
Copyright 2014 Pearson Education, Inc. 9
What Are Interagency Guidelines?
❑ The dependence of financial institutions upon
information systems is a source of risks
❑ The interagency guidelines (IG) were created as a
way to mitigate those risks related to information
being compromised
❑ The IG require every covered institution to
implement a comprehensive written information
security program that includes administrative,
technical, and physical safeguards
Copyright 2014 Pearson Education, Inc. 10
What Are Interagency Guidelines?
Cont.
■ Information Security Program Requirements
■ Involving the board of directors
■ Assessing risk
■ Managing and controlling risks
■ Overseeing service provider arrangements
■ Adjusting the program
■ Reporting to the board
Copyright 2014 Pearson Education, Inc. 11
Involve the Board of Directors
■ The board must approve the bank’s written information
security program
■ The board must oversee the development,
implementation, and maintenance of the program
■ As corporate officials, the board has a fiduciary and
legal responsibility
■ Banks should provide board members with appropriate
training on information security
■ The board may in turn delegate information security
tasks to other roles and/or committees
Copyright 2014 Pearson Education, Inc. 12
Assess Risk
❑ Risk assessments start by creating an inventory of
all information items and information systems
❑ Identifying threats is the next step
■ Threat: Potential for violation of security
■ Threat assessment: Identification of types of threats
■ Threat analysis: Systematic rating of threats based upon
risk and probability
■ Threat probability: Likelihood that a threat will
materialize
■ Residual risk: The level of risk after controls have been
implemented
Copyright 2014 Pearson Education, Inc. 13
Manage and Control Risk
❑ The information security program should be designed to
control the identified risks commensurate with the
sensitivity of the information as well as the complexity and
scope of its activities:
▪ Access controls on customer information systems
▪ Access restrictions at physical locations containing
customer information
▪ Encryption of electronic customer information
▪ Separation of duties
▪ Monitoring systems to identify attacks
▪ Incident response program
▪ Disaster recovery plan
Copyright 2014 Pearson Education, Inc. 14
Training
❑ Institutions must implement ongoing information
security awareness program
❑ Staff should receive security training at least once
a year
❑ Training can be instructor led or online
❑ Untrained staff are perfect targets for hackers!
Copyright 2014 Pearson Education, Inc. 15
Testing
■ All controls must be tested
❑ Priority should be given to high-risk, critical systems
❑ Separation of duties applies to control testing
❑ Three most commonly testing methodologies
■ Audit
❑ Evidence-based examination that compares current practices
against internal or external criteria
■ Assessments
❑ A focused privileged inspection
■ Assurance test
❑ Measures how well controls work by subjecting the system to an
actual attack
Copyright 2014 Pearson Education, Inc. 16
Oversee Service Provider
Arrangements
■ Financial institutions must ensure that service providers
have implemented security controls in accordance with
GLBA
■ Recommended oversight procedures:
❑ Conduct risk assessment
❑ Use due diligence when selecting third parties
❑ Implementing contractual assurances regarding security
responsibilities, controls, and reporting
❑ Requiring non-disclosure agreements
❑ Providing third-party review of the service provider’s security
through audits and tests
❑ Coordinating incident response policies and contractual
notification requirements
❑ Review third-party agreements and performance at least annually
Copyright 2014 Pearson Education, Inc. 17
Adjusting the Program
■ Effective monitoring involves both technical
and non-technical evaluations
■ Change drivers include mergers and
acquisitions, changes in technology, changes
in data sensitivity
■ Information security policy should be
reviewed at least annually
Copyright 2014 Pearson Education, Inc. 18
Report to the Board
■ Reporting to the board should take place at
least annually and describe the overall status
of the information security program and the
organization's compliance with the
interagency guidelines
❑ The report needs to address risk assessment and
management, control decisions, service provider
arrangements, employee training, independent
audits and testing, recommendation for change of
the program
What Is Regulatory Examination?
■ Regulatory agencies are responsible for
oversight and supervision of financial institutions
■ Exams are conducted every 12 to 18 months
■ The exam includes evaluation of policies,
processes, personnel, controls, and outcomes
■ Financial institutions are given a rating on a
scale of 1 to 5, with 1 representing the best
rating and 5 the worst rating with the highest
degree of concern
Copyright 2014 Pearson Education, Inc. 19
Copyright 2014 Pearson Education, Inc. 20
Personal and Corporate Identity
Theft
■ Personal identity theft occurs when someone possesses
and uses any identifying information that is not his with
the intent to commit fraud or other crimes
❑ Identifying information includes:
❑ Name
❑ Date of birth
❑ Social Security numbers
❑ Credit card numbers
■ Corporate identity theft when criminals attempt to
impersonate authorized employees to access corporate
bank accounts and steal money
❑ Known as corporate account takeover
Copyright 2014 Pearson Education, Inc. 21
Personal and Corporate Identity
Theft cont.
■ Responding to identity theft: Supplement A, “Interagency
Guidance on Response Programs for Unauthorized
Access to Customer Information and Customer Notice”
(“the guidance”)
■ The guidance describes response programs, including
customer notification procedures, that a financial
institution should develop and implement to address
unauthorized access to or use of customer information
■ FTC supports identity theft criminal investigations and
prosecution through its Identity Theft Data
Clearinghouse
Copyright 2014 Pearson Education, Inc. 22
Personal and Corporate Identity
Theft cont.
■ Updated guidance on Internet banking safeguards was
released October 2011
❑ Financial institutions are required to review and update
existing risk assessment at least every 12 months
❑ Financial institutions must implemented a layered security
model
❑ Financial institutions must offer multifactor authentication to
commercial cash management customers
❑ Financial institutions must implement authentication and
transactional fraud monitoring
❑ Financial institutions must educate commercial account
holders about risks associated with online banking
Copyright 2014 Pearson Education, Inc. 23
Summary
❑ Financial institutions must protect the information with which
they are entrusted.
❑ The GLBA requires that standards be developed and assigns
this task to seven federal agencies: The seven monitor
federally insured banks and publish the interagency
guidelines, whereas the FTC oversees organizations that
provide non-traditional financial services and publish the
standards for safeguarding customer information.
❑ The intent of both publications is to protect the confidentiality,
integrity, and availability of non-public personal information.

More Related Content

PPT
Credit Risk Management Presentation
PPTX
Credit risk management presentation
PPTX
1 introduction to financial system.ppt
PPTX
Chapter 1
PPT
Market risk
PDF
Third Party Risk Management Introduction
PPTX
International parity condition
PPT
Ch14 mish11 embfm
Credit Risk Management Presentation
Credit risk management presentation
1 introduction to financial system.ppt
Chapter 1
Market risk
Third Party Risk Management Introduction
International parity condition
Ch14 mish11 embfm

What's hot (20)

PPTX
GLOBAL FINANCIAL SYSTEM
PPTX
Asset liability management
PDF
Investing in the Philippine Stock Market
PPTX
Management of interest rate risk
PPTX
Organizational setup of a bank treasury
PPTX
Financial Crises
PPT
Ch 10 managing human resources
PPTX
put call parity
PPTX
Efficient market hypothesis
PPT
Jntu credit risk-management
PDF
Chartered Accountant’s Role in an Enterprise Risk Management
PPTX
Fund flow statement intro
PPTX
The History of Risk Management
PPT
Money market lec#4
PPT
Asset Pricing Models
PPT
State bank of pakistan
PPTX
Derivatives and Hedging | Finance
PPSX
PPT
The-financial-environment
PPTX
Risks faced by banks
GLOBAL FINANCIAL SYSTEM
Asset liability management
Investing in the Philippine Stock Market
Management of interest rate risk
Organizational setup of a bank treasury
Financial Crises
Ch 10 managing human resources
put call parity
Efficient market hypothesis
Jntu credit risk-management
Chartered Accountant’s Role in an Enterprise Risk Management
Fund flow statement intro
The History of Risk Management
Money market lec#4
Asset Pricing Models
State bank of pakistan
Derivatives and Hedging | Finance
The-financial-environment
Risks faced by banks
Ad

Viewers also liked (20)

PPTX
Chapter 7: Physical & Environmental Security
PPTX
83341 ch12 jacobsen
PPTX
Chapter 14: Regulatory Compliance for the Healthcare Sector
PPTX
Chapter 15: PCI Compliance for Merchants
PPTX
Chapter 8: Communications and Operations Security
PPTX
Chapter 6: Human Resources Security
PPTX
Chapter 5: Asset Management
PPTX
Chapter 1: Understanding Policy
PPTX
Chapter 2: Policy Elements and style
PPTX
Chapter 12: Business Continuity Management
PPTX
Chapter 10: Information Systems Acquisition, Development, and Maintenance
PPTX
Chapter 9: Access Control Management
PPTX
Chapter 11: Information Security Incident Management
PPTX
Chapter 4: Governance and Risk Management
PPTX
83341 ch06 jacobsen
PPTX
83341 ch13 jacobsen
PPT
83341 ch14 jacobsen
PPTX
83341 ch11 jacobsen
PPTX
83341 ch09 jacobsen
PPTX
83341 ch07 jacobsen
Chapter 7: Physical & Environmental Security
83341 ch12 jacobsen
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 15: PCI Compliance for Merchants
Chapter 8: Communications and Operations Security
Chapter 6: Human Resources Security
Chapter 5: Asset Management
Chapter 1: Understanding Policy
Chapter 2: Policy Elements and style
Chapter 12: Business Continuity Management
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Chapter 9: Access Control Management
Chapter 11: Information Security Incident Management
Chapter 4: Governance and Risk Management
83341 ch06 jacobsen
83341 ch13 jacobsen
83341 ch14 jacobsen
83341 ch11 jacobsen
83341 ch09 jacobsen
83341 ch07 jacobsen
Ad

Similar to Chapter 13: Regulatory Compliance for Financial Institutions (20)

PPTX
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
PDF
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
PDF
Cybersecurity crisis management a prep guide
PDF
Upgrade Your Banking Experience with Advanced Core Banking Applications
PDF
AML Fundamentals: Strengthening Your Financial Crime Defenses
PDF
Weaver - Financial Institutions Consulting
PPTX
Opportunities At NYCM
PPTX
Strategies for Prevention and Response on Forgery, Fraudulence, Bribery, U...
PDF
Information Security Incident Management.pdf
PDF
Trends 121415 Citizens Bank
PPTX
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
PPSX
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
PPTX
Certified Banking Security C-Suite - CFO Lane.pptx
PPTX
Auditing Principles1
PPTX
Navigate the Financial Crime Landscape with a Vendor Management Program
PDF
5. op risk and aml
PPT
Protecting Donor Privacy
PPTX
How to Prepare Your Firm for a Visit from the SRA
PDF
D&B onboard.pdf
PDF
Chris Anastasopoulos: Executing a Seamless IPO – IFRS, Risk & Stakeholder Str...
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
Cybersecurity crisis management a prep guide
Upgrade Your Banking Experience with Advanced Core Banking Applications
AML Fundamentals: Strengthening Your Financial Crime Defenses
Weaver - Financial Institutions Consulting
Opportunities At NYCM
Strategies for Prevention and Response on Forgery, Fraudulence, Bribery, U...
Information Security Incident Management.pdf
Trends 121415 Citizens Bank
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
Certified Banking Security C-Suite - CFO Lane.pptx
Auditing Principles1
Navigate the Financial Crime Landscape with a Vendor Management Program
5. op risk and aml
Protecting Donor Privacy
How to Prepare Your Firm for a Visit from the SRA
D&B onboard.pdf
Chris Anastasopoulos: Executing a Seamless IPO – IFRS, Risk & Stakeholder Str...

More from Nada G.Youssef (17)

PPTX
مجلة 1
PPTX
Chapter Tewlve
PPTX
Chapter Eleven
PPTX
Chapter Ten
PPTX
Chapter Nine
PPTX
Chapter Eight
PPTX
Chapter Seven
PPTX
Chapter Six
PPTX
Chapter Five
PPTX
Chapter Four
PPTX
Chapter Three
PPTX
Chapter Two
PPTX
Chapter one
PPT
Chapter 3: Information Security Framework
PPTX
Preparatory Year of Saudi Electronic University
PPT
Chapter 12
PPTX
Chapter 11
مجلة 1
Chapter Tewlve
Chapter Eleven
Chapter Ten
Chapter Nine
Chapter Eight
Chapter Seven
Chapter Six
Chapter Five
Chapter Four
Chapter Three
Chapter Two
Chapter one
Chapter 3: Information Security Framework
Preparatory Year of Saudi Electronic University
Chapter 12
Chapter 11

Recently uploaded (20)

PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
M.Tech in Aerospace Engineering | BIT Mesra
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
Climate and Adaptation MCQs class 7 from chatgpt
PDF
plant tissues class 6-7 mcqs chatgpt.pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
Journal of Dental Science - UDMY (2020).pdf
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
M.Tech in Aerospace Engineering | BIT Mesra
FORM 1 BIOLOGY MIND MAPS and their schemes
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Literature_Review_methods_ BRACU_MKT426 course material
Everyday Spelling and Grammar by Kathi Wyldeck
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
HVAC Specification 2024 according to central public works department
Climate and Adaptation MCQs class 7 from chatgpt
plant tissues class 6-7 mcqs chatgpt.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf

Chapter 13: Regulatory Compliance for Financial Institutions

  • 1. Security Program and Policies Principles and Practices by Sari Stern Greene Chapter 13: Regulatory Compliance for Financial Institutions
  • 2. Copyright 2014 Pearson Education, Inc. 2 Objectives ■ Explain financial institution information security regulatory compliance requirements ■ Understand the components of a GLBA- compliant information security program ■ Prepare for a regulatory examination ■ Respond to the twin threats of personal identity theft and corporate account takeover
  • 3. Copyright 2014 Pearson Education, Inc. 3 Introduction ■ A financial institution’s most significant asset is not money: It’s information about money, transactions and customers ■ Protection of those information assets is necessary to establish the required trust for the institution to conduct business ■ Institutions have a responsibility to protect their client’s information and privacy from harm such as fraud and ID theft
  • 4. Copyright 2014 Pearson Education, Inc. 4 The Gramm-Leach-Bliley Act (GLBA) ❑ Signed into law by President Clinton in 1999 ❑ Also known as the Financial Modernization Act of 1999 ❑ Meant to allow banks to engage in a wide array of financial services ❑ Banks can now merge with stock brokerage companies and insurance companies, which means that they can possess large amounts of private, personal client information
  • 5. Copyright 2014 Pearson Education, Inc. 5 The Gramm-Leach-Bliley Act (GLBA) Cont. ❑ Title 5 of the GLBA specifically addresses protecting both the privacy and the security of non-public personal information (NPPI) ■ Privacy Rule ❑ Limits the financial institutions disclosure of NPPI to unaffiliated third parties ■ Security Guidelines ❑ Address safeguarding the confidentiality and security of customer NPPI and ensuring proper disposal of NPPI
  • 6. Copyright 2014 Pearson Education, Inc. 6 The Gramm-Leach-Bliley Act (GLBA) Cont. ❑ What is NPPI? ■ Stands for non-public personal information ■ Includes the following information: ❑ Names ❑ Addresses ❑ Phone numbers ❑ Income and credit histories ❑ Social Security numbers
  • 7. Copyright 2014 Pearson Education, Inc. 7 What Is a Financial Institution? ■ Financial institution is “Any institution the business of which is significantly engaged in financial activities as described in Section 4(k) of the Bank Holding Company Act (12 U.S.C. § 1843(k).” ■ GLBA also applies to companies that provide financial products and/or services such as: ❑ Automobile dealers ❑ Check-cashing businesses ❑ Consumer reporting agencies ❑ Courier services ❑ Debt collectors
  • 8. Copyright 2014 Pearson Education, Inc. 8 Regulatory Oversight ■ Seven federal agencies and the states have authority to administer and enforce the Financial Privacy Rule and Section 501(b) ■ Which agency is tasked with enforcing the regulation, along with the severity of the penalty, is dependent upon the industry to which the business belongs ■ Nontraditional financial services companies are regulated by the FTC but are not subject to scheduled, regular audits unless a complaint has been lodged against them
  • 9. Copyright 2014 Pearson Education, Inc. 9 What Are Interagency Guidelines? ❑ The dependence of financial institutions upon information systems is a source of risks ❑ The interagency guidelines (IG) were created as a way to mitigate those risks related to information being compromised ❑ The IG require every covered institution to implement a comprehensive written information security program that includes administrative, technical, and physical safeguards
  • 10. Copyright 2014 Pearson Education, Inc. 10 What Are Interagency Guidelines? Cont. ■ Information Security Program Requirements ■ Involving the board of directors ■ Assessing risk ■ Managing and controlling risks ■ Overseeing service provider arrangements ■ Adjusting the program ■ Reporting to the board
  • 11. Copyright 2014 Pearson Education, Inc. 11 Involve the Board of Directors ■ The board must approve the bank’s written information security program ■ The board must oversee the development, implementation, and maintenance of the program ■ As corporate officials, the board has a fiduciary and legal responsibility ■ Banks should provide board members with appropriate training on information security ■ The board may in turn delegate information security tasks to other roles and/or committees
  • 12. Copyright 2014 Pearson Education, Inc. 12 Assess Risk ❑ Risk assessments start by creating an inventory of all information items and information systems ❑ Identifying threats is the next step ■ Threat: Potential for violation of security ■ Threat assessment: Identification of types of threats ■ Threat analysis: Systematic rating of threats based upon risk and probability ■ Threat probability: Likelihood that a threat will materialize ■ Residual risk: The level of risk after controls have been implemented
  • 13. Copyright 2014 Pearson Education, Inc. 13 Manage and Control Risk ❑ The information security program should be designed to control the identified risks commensurate with the sensitivity of the information as well as the complexity and scope of its activities: ▪ Access controls on customer information systems ▪ Access restrictions at physical locations containing customer information ▪ Encryption of electronic customer information ▪ Separation of duties ▪ Monitoring systems to identify attacks ▪ Incident response program ▪ Disaster recovery plan
  • 14. Copyright 2014 Pearson Education, Inc. 14 Training ❑ Institutions must implement ongoing information security awareness program ❑ Staff should receive security training at least once a year ❑ Training can be instructor led or online ❑ Untrained staff are perfect targets for hackers!
  • 15. Copyright 2014 Pearson Education, Inc. 15 Testing ■ All controls must be tested ❑ Priority should be given to high-risk, critical systems ❑ Separation of duties applies to control testing ❑ Three most commonly testing methodologies ■ Audit ❑ Evidence-based examination that compares current practices against internal or external criteria ■ Assessments ❑ A focused privileged inspection ■ Assurance test ❑ Measures how well controls work by subjecting the system to an actual attack
  • 16. Copyright 2014 Pearson Education, Inc. 16 Oversee Service Provider Arrangements ■ Financial institutions must ensure that service providers have implemented security controls in accordance with GLBA ■ Recommended oversight procedures: ❑ Conduct risk assessment ❑ Use due diligence when selecting third parties ❑ Implementing contractual assurances regarding security responsibilities, controls, and reporting ❑ Requiring non-disclosure agreements ❑ Providing third-party review of the service provider’s security through audits and tests ❑ Coordinating incident response policies and contractual notification requirements ❑ Review third-party agreements and performance at least annually
  • 17. Copyright 2014 Pearson Education, Inc. 17 Adjusting the Program ■ Effective monitoring involves both technical and non-technical evaluations ■ Change drivers include mergers and acquisitions, changes in technology, changes in data sensitivity ■ Information security policy should be reviewed at least annually
  • 18. Copyright 2014 Pearson Education, Inc. 18 Report to the Board ■ Reporting to the board should take place at least annually and describe the overall status of the information security program and the organization's compliance with the interagency guidelines ❑ The report needs to address risk assessment and management, control decisions, service provider arrangements, employee training, independent audits and testing, recommendation for change of the program
  • 19. What Is Regulatory Examination? ■ Regulatory agencies are responsible for oversight and supervision of financial institutions ■ Exams are conducted every 12 to 18 months ■ The exam includes evaluation of policies, processes, personnel, controls, and outcomes ■ Financial institutions are given a rating on a scale of 1 to 5, with 1 representing the best rating and 5 the worst rating with the highest degree of concern Copyright 2014 Pearson Education, Inc. 19
  • 20. Copyright 2014 Pearson Education, Inc. 20 Personal and Corporate Identity Theft ■ Personal identity theft occurs when someone possesses and uses any identifying information that is not his with the intent to commit fraud or other crimes ❑ Identifying information includes: ❑ Name ❑ Date of birth ❑ Social Security numbers ❑ Credit card numbers ■ Corporate identity theft when criminals attempt to impersonate authorized employees to access corporate bank accounts and steal money ❑ Known as corporate account takeover
  • 21. Copyright 2014 Pearson Education, Inc. 21 Personal and Corporate Identity Theft cont. ■ Responding to identity theft: Supplement A, “Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice” (“the guidance”) ■ The guidance describes response programs, including customer notification procedures, that a financial institution should develop and implement to address unauthorized access to or use of customer information ■ FTC supports identity theft criminal investigations and prosecution through its Identity Theft Data Clearinghouse
  • 22. Copyright 2014 Pearson Education, Inc. 22 Personal and Corporate Identity Theft cont. ■ Updated guidance on Internet banking safeguards was released October 2011 ❑ Financial institutions are required to review and update existing risk assessment at least every 12 months ❑ Financial institutions must implemented a layered security model ❑ Financial institutions must offer multifactor authentication to commercial cash management customers ❑ Financial institutions must implement authentication and transactional fraud monitoring ❑ Financial institutions must educate commercial account holders about risks associated with online banking
  • 23. Copyright 2014 Pearson Education, Inc. 23 Summary ❑ Financial institutions must protect the information with which they are entrusted. ❑ The GLBA requires that standards be developed and assigns this task to seven federal agencies: The seven monitor federally insured banks and publish the interagency guidelines, whereas the FTC oversees organizations that provide non-traditional financial services and publish the standards for safeguarding customer information. ❑ The intent of both publications is to protect the confidentiality, integrity, and availability of non-public personal information.