SlideShare a Scribd company logo
Information Classification: Public
COMPLIANCE AND SECURITY:
BUILDING A CYBERSECURITY
RISK MANAGEMENT
PROGRAM
Central Ohio Infosec Summit - 2016
Jason Harrell
Corporate Senior Information Risk Officer (CSIRO)
Investment Management
BNY Mellon
March 30, 2016
Information Classification: Public
AUDIENCE QUESTIONS
• How many of you are Chief Information Security Officers or Chief Information Risk Officers
for your organization?
• How many of you have regularly scheduled meetings with your Chief Compliance Officers
on cybersecurity regulations?
• How many of you have regularly scheduled meetings with your Legal Counsel (internal
and/or external)?
• How many of you have regularly scheduled meeting with your Chief Operating Officer or
equivalent?
• How many of you subscribe to industry publications for the industry for which you work?
• How many of you brief your Board of Directors on cybersecurity risks for your organization?
2
Information Classification: Public
KEY TAKEAWAYS
• As a Chief Information Security Officer (CISO) and Chief Information Risk Officer (CIRO),
you will be required to understand and articulate the business impacts for cybersecurity risk
failures that resonates with your audience
• As executives, we will need to balance our compliance obligations for cybersecurity controls
with our business’ operational cybersecurity risks to prioritize our risk management efforts
(EXHAUSTIVE MEDIOCRITY)
• Cybersecurity controls must be embedded into the business processes to be effective (i.e.,
the business must be involved with the execution of cybersecurity controls)
• As an executive, you need to understand your risk posture/maturity relative to your peer
group
• How your organization responds to a cyber incident is equally as important as the
preventative measures taken to prevent an incident
3
Information Classification: Public
WHAT IS CYBERSECURITY RISK MANAGEMENT?
THE MANAGEMENT OF THE BUSINESS’ LEGAL, REGULATORY, OPERATIONAL,
AND CLIENT RISKS THAT MAY RESULT FROM ITS USE OF INFORMATION,
TECHNOLOGY, OR ASSOCIATED BUSINESS PROCESSES IN ORDER TO ALIGN
WITH THE BUSINESS’ RISK APPETITE.
CYBERSECURITY RISKS EXTEND BEYOND TECHNOLOGY. THE CONTROLS MUST
BE EMBEDDED INTO THE BUSINESS PROCESS TO BE EFFECTIVE!
4
Information Classification: Public
CYBERSECURITY RISK MANAGEMENT EXPECTATIONS
 In general, regulatory authorities want to provide businesses with a principles based risk
approach to provide flexibility. Common guidance from the regulatory authorities (financial)
is that controls should be appropriate based on
 The size and complexity of business operations
 The makeup of the customers and counterparties serviced
 The products and markets traded
 Access to trading venues and other industry participants (i.e., market
interconnectedness)
Depending on your sector and regional presence, your business may have more
prescriptive requirements for cybersecurity controls (e.g., OCC Third Party Risk
Management)
The NIST Framework is recommended by different regulatory authorities but is not a silver
bullet. Every organization must understand the risks relative to its business operations and
the controls that are used to manage these risks
5
Information Classification: Public
BOARD AND EXECUTIVE MANAGEMENT QUESTIONS
• When do I know when I have spent enough on cybersecurity controls? (i.e., When have I
spent too much on cybersecurity?)
• How does our cybersecurity program stack up against our peers?
• Is our business in compliance with our regulatory obligations for managing cybersecurity
risks?
• What are the legal / client / fiduciary / regulatory impacts for cybersecurity failures AND do
we understand those impacts on business operations?
• Could an event like Target / Sony / Anthem / Home Depot happen at our organization?
• How do we know that we haven’t been hacked already?
• Are we prepared to manage a cybersecurity incident and, if not, how long will it take for us
to be appropriately prepared?
6
Information Classification: Public
ARE WE SPEAKING THE SAME LANGUAGE
AS THOSE WE NEED TO INFLUENCE?
7
Information Classification: Public
LEGAL / REGULATORY OBLIGATIONS
Every regulatory agency has a rule requiring the adoption and implementation of written
policies and procedures reasonably designed to prevent violation of federal security laws
As the CISO or CIRO, do you know the compliance rules
relative to internal control requirements for your business?
Client Contracts and Addendums
As the CISO or CIRO, do you have visibility into
client agreements being entered into by your business areas?
Enforcement Actions
As the CISO or CIRO, do you understand how fines
and enforcement actions are being levied in your sector?
Regulatory Focus
There are a number of areas relative to cybersecurity risk management.
Do you know where there regulatory focus is on the required controls?
8
Information Classification: Public
OPERATIONAL IMPACTS
 Numerous cybersecurity risks are realized due to (1) the lack of demarcation of the business and
technology responsibility for controls (2) inappropriate business processes to managing changing
risk environment
How does your business ensure that cybersecurity
controls extend and are embedded into associated business processes?
While many business have a technology incident response plan, they do not have an appropriate
business incident response plan or crisis communication plan.
Does your business have a crisis communication plan that includes engagement of external
counsel, regulatory reporting, law enforcement engagement, media relations, client
communications?
The lack of understanding of how the business operates causes may lead to arduous and/or
ineffective implementation of controls
How do you train the individuals in your organization to look outside of the technology
controls to those controls that are part of the business process?
 The maturity of your peer’s cybersecurity risk management program will contribute to your
definition of reasonable and adequate controls.
Do you know where the cybersecurity risk management
program stacks up relative to your peer group?
9
Information Classification: Public
Communicating cybersecurity risks and associated impacts through
a common vernacular as the individuals you are trying to influence
will increase your success with gaining the support required for your
cybersecurity risk management program.
11
Information Classification: Public
IMPORTANT POINTS
 Remember that you are competing for a limited pool of resources (e.g., money, personnel)
with other risk and control organizations as well as the business revenue-generating
programs
You can’t fix everything at once! As an executive, you need to define and defend those risk
gaps that you are addressing and demonstrate that you understand those areas that will
also need additional focus
Technology controls without business adoption will not decrease your business risks. These
controls must be embedded into the business operational processes
Understanding where your program is relative to your peer group will assist you with
gaining executive program support and changes in the risk management posture within
your industry
12
Information Classification: Public
Questions??
13
14
 CYBERSECURITY RULES/RULES
INTERPRETATION AND GUIDANCE –
INVESTMENT ADVISERS
REGULATORY LANDSCAPE
Information Classification: Public
Cybersecurity Rules / Rule Interpretations / Guidance
 Regulation S-P (including Safeguards Rule)
 Regulation S-ID (Identity Theft Red Flags)
 IAA Rule 206(4) – 7 and ICA Rule 38a-1 (Compliance Rules)
 IAA Rule 204-2(g) and ICA Rule 31a-2(f) (Electronic Recordkeeping Rules)
 ICA Rule 30a-3 (Internal Controls)
 CFTC Regulations, Part 160.30
 FTC enforcement of Section 5 of FTCA
 OCC Bulletin 2013 – 29 Third Party Risk Management Guidance
 NFA Compliance Rules 2-9, 2-36 and 2-49 Interpretive Notice
15

More Related Content

PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PPTX
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
PPTX
Bob West - Educating the Board of Directors
PDF
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
PPTX
Aaron Higbee - The Humanity of Phishing Attack & Defense
PDF
Why Zero Trust Yields Maximum Security
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Bob West - Educating the Board of Directors
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Aaron Higbee - The Humanity of Phishing Attack & Defense
Why Zero Trust Yields Maximum Security

What's hot (20)

PDF
Ruben Melendez - Economically Justifying IT Security Initiatives
PDF
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
PDF
Hardware Security on Vehicles
PPTX
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
PPTX
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
PDF
The Real Costs of SIEM vs. Managed Security Service
PDF
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
PPTX
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
PPSX
William Diederich - Security Certifications: Are They Worth the Investment? A...
PDF
Enumerating your shadow it attack surface
PDF
Next generation security analytics
PPTX
Helen Patton - Cross-Industry Collaboration
PDF
The State of Threat Detection 2019
PDF
Debunked: 5 Myths About Zero Trust Security
PDF
Digital Transformation and Security for the Modern Business Part 1 – Finance
PPTX
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
PDF
Cyber Security 4.0 conference 30 November 2016
PDF
Evidence-Based Security: The New Top Five Controls
PPTX
Keith Fricke - CISO for an Hour
Ruben Melendez - Economically Justifying IT Security Initiatives
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Hardware Security on Vehicles
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
The Real Costs of SIEM vs. Managed Security Service
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
William Diederich - Security Certifications: Are They Worth the Investment? A...
Enumerating your shadow it attack surface
Next generation security analytics
Helen Patton - Cross-Industry Collaboration
The State of Threat Detection 2019
Debunked: 5 Myths About Zero Trust Security
Digital Transformation and Security for the Modern Business Part 1 – Finance
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Cyber Security 4.0 conference 30 November 2016
Evidence-Based Security: The New Top Five Controls
Keith Fricke - CISO for an Hour
Ad

Viewers also liked (20)

ODP
Providing a Flexible Approach to the Inflexible World of Information Security...
PPT
The Business Of Information Security V2.0
PDF
"Thinking diffrent" about your information security strategy
PDF
Bank Director List of Worries
PDF
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
PDF
Cyber security: Five leadership issues worthy of board and executive attention
PDF
Websense
PDF
10 Rules for Vendors - an Overview
PDF
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
PPTX
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
PPTX
Cyber risk tips for boards and executive teams
PPSX
Board and Cyber Security
PPTX
RSA 2017 - CISO's 5 steps to Success
PPTX
Information Security in a Compliance World
PDF
What CIOs Need To Tell Their Boards About Cyber Security
PDF
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
PDF
Operational security | How to design your information security GRC (governanc...
PDF
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
PDF
NTXISSACSC4 - A Day in the Life of a CISO
PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Providing a Flexible Approach to the Inflexible World of Information Security...
The Business Of Information Security V2.0
"Thinking diffrent" about your information security strategy
Bank Director List of Worries
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cyber security: Five leadership issues worthy of board and executive attention
Websense
10 Rules for Vendors - an Overview
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Cyber risk tips for boards and executive teams
Board and Cyber Security
RSA 2017 - CISO's 5 steps to Success
Information Security in a Compliance World
What CIOs Need To Tell Their Boards About Cyber Security
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
Operational security | How to design your information security GRC (governanc...
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - A Day in the Life of a CISO
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Ad

Similar to Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Management Program (20)

PPTX
Cybersecurity-Course.9643104.powerpoint.pptx
PDF
A Major Revision of the CISRCP Program
PPTX
defensible_security-executive_support-sample.pptx
PPTX
Information Security and Risk Management.pptx
PPT
Cybersecurity and the regulator, what you need to know
PPTX
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
PDF
Cybersecurity for Small Business
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
PPTX
Cybersecurity-Real World Approach FINAL 2-24-16
PPTX
Stay Ahead of Threats with Advanced Security Protection - Fortinet
PPTX
Week 1&2 intro_ v2-upload
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PDF
Department of Homeland Security Guidance
PDF
DHS Guidelines
PPTX
CRI Extract from "Cyber Lessons from the Front lines"
PPTX
Information & Cyber Security Risk
PDF
Executive Summary on the Cyber Risk Webinar
PPTX
Cissp- Security and Risk Management
Cybersecurity-Course.9643104.powerpoint.pptx
A Major Revision of the CISRCP Program
defensible_security-executive_support-sample.pptx
Information Security and Risk Management.pptx
Cybersecurity and the regulator, what you need to know
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
Cybersecurity for Small Business
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Dealing with Information Security, Risk Management & Cyber Resilience
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Cybersecurity-Real World Approach FINAL 2-24-16
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Week 1&2 intro_ v2-upload
Cybersecurity Frameworks and You: The Perfect Match
Department of Homeland Security Guidance
DHS Guidelines
CRI Extract from "Cyber Lessons from the Front lines"
Information & Cyber Security Risk
Executive Summary on the Cyber Risk Webinar
Cissp- Security and Risk Management

More from centralohioissa (20)

PPTX
Mike Spaulding - Building an Application Security Program
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
PPTX
Tre Smith - From Decision to Implementation: Who's On First?
PPTX
Sean Whalen - How to Hack a Hospital
PDF
Robert Hurlbut - Threat Modeling for Secure Software Design
PPTX
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
PDF
Rafeeq Rehman - Breaking the Phishing Attack Chain
PPTX
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
PPTX
Ed McCabe - Putting the Intelligence back in Threat Intelligence
PDF
Ofer Maor - Security Automation in the SDLC - Real World Cases
PPTX
Jim Libersky: Cyber Security - Super Bowl 50
PPTX
Jim Wojno: Incident Response - No Pain, No Gain!
PPTX
Jason Samide - State of Security & 2016 Predictions
PPTX
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
PDF
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
PPTX
Sam Herath - Six Critical Criteria for Cloud Workload Security
PPTX
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
PPTX
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
PPTX
Jon Gorenflo - Burp Collaborator
Mike Spaulding - Building an Application Security Program
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Tre Smith - From Decision to Implementation: Who's On First?
Sean Whalen - How to Hack a Hospital
Robert Hurlbut - Threat Modeling for Secure Software Design
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Rafeeq Rehman - Breaking the Phishing Attack Chain
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ofer Maor - Security Automation in the SDLC - Real World Cases
Jim Libersky: Cyber Security - Super Bowl 50
Jim Wojno: Incident Response - No Pain, No Gain!
Jason Samide - State of Security & 2016 Predictions
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Sam Herath - Six Critical Criteria for Cloud Workload Security
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Jon Gorenflo - Burp Collaborator

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Big Data Technologies - Introduction.pptx
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Monthly Chronicles - July 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Mobile App Security Testing_ A Comprehensive Guide.pdf
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
GamePlan Trading System Review: Professional Trader's Honest Take
Network Security Unit 5.pdf for BCA BBA.
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Advanced Soft Computing BINUS July 2025.pdf
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Monthly Chronicles - July 2025
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology

Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Management Program

  • 1. Information Classification: Public COMPLIANCE AND SECURITY: BUILDING A CYBERSECURITY RISK MANAGEMENT PROGRAM Central Ohio Infosec Summit - 2016 Jason Harrell Corporate Senior Information Risk Officer (CSIRO) Investment Management BNY Mellon March 30, 2016
  • 2. Information Classification: Public AUDIENCE QUESTIONS • How many of you are Chief Information Security Officers or Chief Information Risk Officers for your organization? • How many of you have regularly scheduled meetings with your Chief Compliance Officers on cybersecurity regulations? • How many of you have regularly scheduled meetings with your Legal Counsel (internal and/or external)? • How many of you have regularly scheduled meeting with your Chief Operating Officer or equivalent? • How many of you subscribe to industry publications for the industry for which you work? • How many of you brief your Board of Directors on cybersecurity risks for your organization? 2
  • 3. Information Classification: Public KEY TAKEAWAYS • As a Chief Information Security Officer (CISO) and Chief Information Risk Officer (CIRO), you will be required to understand and articulate the business impacts for cybersecurity risk failures that resonates with your audience • As executives, we will need to balance our compliance obligations for cybersecurity controls with our business’ operational cybersecurity risks to prioritize our risk management efforts (EXHAUSTIVE MEDIOCRITY) • Cybersecurity controls must be embedded into the business processes to be effective (i.e., the business must be involved with the execution of cybersecurity controls) • As an executive, you need to understand your risk posture/maturity relative to your peer group • How your organization responds to a cyber incident is equally as important as the preventative measures taken to prevent an incident 3
  • 4. Information Classification: Public WHAT IS CYBERSECURITY RISK MANAGEMENT? THE MANAGEMENT OF THE BUSINESS’ LEGAL, REGULATORY, OPERATIONAL, AND CLIENT RISKS THAT MAY RESULT FROM ITS USE OF INFORMATION, TECHNOLOGY, OR ASSOCIATED BUSINESS PROCESSES IN ORDER TO ALIGN WITH THE BUSINESS’ RISK APPETITE. CYBERSECURITY RISKS EXTEND BEYOND TECHNOLOGY. THE CONTROLS MUST BE EMBEDDED INTO THE BUSINESS PROCESS TO BE EFFECTIVE! 4
  • 5. Information Classification: Public CYBERSECURITY RISK MANAGEMENT EXPECTATIONS  In general, regulatory authorities want to provide businesses with a principles based risk approach to provide flexibility. Common guidance from the regulatory authorities (financial) is that controls should be appropriate based on  The size and complexity of business operations  The makeup of the customers and counterparties serviced  The products and markets traded  Access to trading venues and other industry participants (i.e., market interconnectedness) Depending on your sector and regional presence, your business may have more prescriptive requirements for cybersecurity controls (e.g., OCC Third Party Risk Management) The NIST Framework is recommended by different regulatory authorities but is not a silver bullet. Every organization must understand the risks relative to its business operations and the controls that are used to manage these risks 5
  • 6. Information Classification: Public BOARD AND EXECUTIVE MANAGEMENT QUESTIONS • When do I know when I have spent enough on cybersecurity controls? (i.e., When have I spent too much on cybersecurity?) • How does our cybersecurity program stack up against our peers? • Is our business in compliance with our regulatory obligations for managing cybersecurity risks? • What are the legal / client / fiduciary / regulatory impacts for cybersecurity failures AND do we understand those impacts on business operations? • Could an event like Target / Sony / Anthem / Home Depot happen at our organization? • How do we know that we haven’t been hacked already? • Are we prepared to manage a cybersecurity incident and, if not, how long will it take for us to be appropriately prepared? 6
  • 7. Information Classification: Public ARE WE SPEAKING THE SAME LANGUAGE AS THOSE WE NEED TO INFLUENCE? 7
  • 8. Information Classification: Public LEGAL / REGULATORY OBLIGATIONS Every regulatory agency has a rule requiring the adoption and implementation of written policies and procedures reasonably designed to prevent violation of federal security laws As the CISO or CIRO, do you know the compliance rules relative to internal control requirements for your business? Client Contracts and Addendums As the CISO or CIRO, do you have visibility into client agreements being entered into by your business areas? Enforcement Actions As the CISO or CIRO, do you understand how fines and enforcement actions are being levied in your sector? Regulatory Focus There are a number of areas relative to cybersecurity risk management. Do you know where there regulatory focus is on the required controls? 8
  • 9. Information Classification: Public OPERATIONAL IMPACTS  Numerous cybersecurity risks are realized due to (1) the lack of demarcation of the business and technology responsibility for controls (2) inappropriate business processes to managing changing risk environment How does your business ensure that cybersecurity controls extend and are embedded into associated business processes? While many business have a technology incident response plan, they do not have an appropriate business incident response plan or crisis communication plan. Does your business have a crisis communication plan that includes engagement of external counsel, regulatory reporting, law enforcement engagement, media relations, client communications? The lack of understanding of how the business operates causes may lead to arduous and/or ineffective implementation of controls How do you train the individuals in your organization to look outside of the technology controls to those controls that are part of the business process?  The maturity of your peer’s cybersecurity risk management program will contribute to your definition of reasonable and adequate controls. Do you know where the cybersecurity risk management program stacks up relative to your peer group? 9
  • 10. Information Classification: Public Communicating cybersecurity risks and associated impacts through a common vernacular as the individuals you are trying to influence will increase your success with gaining the support required for your cybersecurity risk management program. 11
  • 11. Information Classification: Public IMPORTANT POINTS  Remember that you are competing for a limited pool of resources (e.g., money, personnel) with other risk and control organizations as well as the business revenue-generating programs You can’t fix everything at once! As an executive, you need to define and defend those risk gaps that you are addressing and demonstrate that you understand those areas that will also need additional focus Technology controls without business adoption will not decrease your business risks. These controls must be embedded into the business operational processes Understanding where your program is relative to your peer group will assist you with gaining executive program support and changes in the risk management posture within your industry 12
  • 13. 14  CYBERSECURITY RULES/RULES INTERPRETATION AND GUIDANCE – INVESTMENT ADVISERS REGULATORY LANDSCAPE
  • 14. Information Classification: Public Cybersecurity Rules / Rule Interpretations / Guidance  Regulation S-P (including Safeguards Rule)  Regulation S-ID (Identity Theft Red Flags)  IAA Rule 206(4) – 7 and ICA Rule 38a-1 (Compliance Rules)  IAA Rule 204-2(g) and ICA Rule 31a-2(f) (Electronic Recordkeeping Rules)  ICA Rule 30a-3 (Internal Controls)  CFTC Regulations, Part 160.30  FTC enforcement of Section 5 of FTCA  OCC Bulletin 2013 – 29 Third Party Risk Management Guidance  NFA Compliance Rules 2-9, 2-36 and 2-49 Interpretive Notice 15