SlideShare a Scribd company logo
PenetrationTest and Vulnerability Assessments:
Examining the SEC and FINRA Requirements
January 25, 2017
Since 2003, SEC Compliance
Consultants, Inc. (SEC3) has been
helping organizations bridge the
SEC, FINRA, CFTC, and NFA
compliance knowledge gap.
Meet John Lukan &
SEC Compliance Consultants, Inc.
• CA, CFA, CMT
• Managing Director of SEC3
• 25 years experience providing fiduciary advice
A boutique cybersecurity services
company specializing in
supporting NFA & SEC registrants
under $3B AUM - primarily RIA’s,
hedgefunds, CTAs, and CPOs.
Meet Michael Brice &
BW Cyber Services
• Co Founder, Principal, Chief Security Officer
• Financial Services Cyber Expert, Former CIO
• B.S. Computer Science, NSATrained
• 30 years of experience (classified & unclassified)
Providing global businesses with
the highest quality solutions to
cybersecurity issues by utilizing a
comprehensive prevent, defend,
contain, and eradicate approach
to threats.
Meet Paul Caiazzo &
TruShield Security Solutions
• Co-Founder, CEO, Chief Security Architect
• CISSP, CISA, CEH
• M.S. in Information Security and Assurance
• 15+ years of experience in Information Security
SEC and FINRA PenTest
Compliance Insight
PenTesting Explained
Penetration Testing (PenTesting)
Webcast Objectives:
Choosing a Qualified PenTest
Vendor
Office of Compliance Inspections and
Examinations (OCIE) - 2017 Focus
Section II. Assessing Market-Wide Risks
• Cybersecurity: In 2017, we will continue our initiative
to examine for cybersecurity compliance procedures
and controls, including testing the implementation of
those procedures and controls.
Section IV. Protecting Retail Investors
• Never-Before Examined Investment Advisers: We are
expanding our Never-Before Examined Adviser
initiative to include focused, risk-based examinations of
newly registered advisers as well as of selected
advisers that have been registered for a longer period
but have never been examined by OCIE.
SEC Case Study “RT Jones”
• (RIA): $75k SEC fine
• Rule 30(a) of Regulation S-P2 (the “Safeguard Rule”) for Cybersecurity
• 3rd party vendor, hosting PII for over 100,000 individuals
• Website hacked by unknown Chinese organization
• R.T. Jones mitigation
• Cybersecurity consultants, identity monitoring…
• R.T. Jones consequences:
• Despite mitigation - SEC concluded they violated the law, issued
censured, and assessed $75k fine
• SEC Message: The SEC made it clear that even in the absence of an actual
attack or a security breach, the failure of a Fund Manager to design and
implement a Cybersecurity Program is actionable.
Nature of theThreat
National States
• Israel
• Russia
• China
• North Korea
• Iran
Organized Crime
• Eastern Europe
• China
• Others around
the globe
Hactivist/Hacktivism
• Anonymous
• Friends of Assange
• Just about anyone
with an agenda
Script Kiddies
• Your neighbor
• The kid down
the street
• A guy or gal
half-way around
the globe
Others
• Competitor
• Insider (purposeful)
• Insider (accidental)
• 3rd Party
We are at war, and we are being beat badly…
PenetrationTesting is our first line of defense against these threats,
because if we don’t test – they will!
SoWhat is a PenetrationTest and/or
Vulnerability Assessment?
• “PenTest” = Ethical Hackers
• Act like a hacker
• Look for ways to get into network
• Look for ways to steal data
• Look for ways to watch everything
• Identify weakness in:
o Operating systems
o Applications
o Passwords and remote accesses
o Known software flaws
• Automated programs that hackers use
to identify security holes
• Test your defenses
• Trick your systems
• Provide possible low security means for
attack
Vulnerability Assessment
(Automated Process)
PenetrationTesting
(Manual Process)
A PenTest combines automated tools with experienced “Testers” to probe your network (internally &
externally) to find and exploit technical weakness and operational vulnerabilities
+
Vulnerability Scan Results
Vulnerability Scanning:
• Hundreds of tools available
• Automated Scanning
• Runs for hours/days
• Looks at everything
• Hundreds of pages output
• No inherent analysis
• Difficult to understand
• Difficult to interpret
• Difficult to prioritize
EXAMPLEVULNERABILITY REPORT:
4 Lines of output from an example report that had over 200 results
PenetrationTesting Results
PenetrationTesting:
• Dozens of tools available
• Manual Probes
• Runs for hours/days
• Tester determines what to look
at/probe
• Output is less bulky
• Analysis in involved
• SHOULD BE Easy to understand
• SHOULD BE easy to interpret
• SHOULD BE easy to prioritize
• SHOULD include keyVulnerability
Scan results
EXAMPLE PENETRATION REPORT:
5 Lines of output from an example report that had 25 results
Apply the security patches and system hardening configuration
changes as described inAppendix B of the SAR,including
ensuring antivirus software and definitions are updated on all
hosts
Disable the firewall management interface from being
accessible across the Internet
Update the firmware to the SonicWALL firewall
Apply a license to the SonicWALL firewall which enables
many of the appliance-capable industry-standard security
features such as Content Filtering,Anti-Virus,Anti-Spyware,
Intrusion Prevention, and Botnet filtering
Deploy real-time log collection and security monitoring
solution that can correlate, aggregate, and alert on
suspicious activity for border firewall, network appliances,
servers, and endpoints
What’s the Difference Between an External and/or Internal PenTest?
External Testing: Internal Testing:
WorkstationWorkstation Workstation
Router or Firewall and Modem
Your Company’s Data and Network
Internet Connection
Banging away at the
webpage or firewall-
trying to get in…
WorkstationWorkstation Workstation
Router or Firewall and Modem
Your Company’s Data and Network
Internal access is assumed-
determining how much
damage can now be done…
Internet Connection
Deliverables & Scope
PenetrationTesting Deliverables Should Be:
• Easy to understand report
• Priority-oriented
• In a format that can be provided to IT vendor and
implemented with ease
• Financially feasible recommendations
• Focused on PII and other industry critical data
You Should Avoid Deliverables that:
• Contain 50+ pages of complex, esoteric recommendations
• Required a PhD in Cybersecurity to understand and
implement critical solutions
• Provide “Million dollar solutions” for a “Thousand dollar
problems”
• Don’t understand your business/your industry
WhatTo Look For in a “Pen Tester”
 U.S.-based testers
 PenTesters possess Government/DoD clearances
 Experience with SEC/FINRA and NFA regulations
 Findings presented in understandable format
 Understand critical asset management related information,
such as PII, Signals, and/or “Crown Jewel” data
 Testing is tailored to asset management and not just a
“one-size fits all” solution
Questions
  
BW Cyber Services 703-675-2242 BWCyberServices.com info@bwcyberservices.com
TruShield 877-583-2841 TruShieldInc.com info@trushieldinc.com
SEC3 212-706-4029 SECCC.com info@seccc.com

More Related Content

PDF
The Current State of Cybersecurity
ODP
Cyber Security & User's Privacy Invasion
PPTX
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
PDF
Ransomware ly
PPTX
Keeping up with the Revolution in IT Security
PPTX
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
PPTX
Beyond The Dark Hacking Screen
PPTX
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
The Current State of Cybersecurity
Cyber Security & User's Privacy Invasion
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
Ransomware ly
Keeping up with the Revolution in IT Security
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Beyond The Dark Hacking Screen
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal

What's hot (20)

PPTX
Aegis Personal Cybersecurity 101
PDF
Five things I learned about information security
PDF
Part 1: Identifying Insider Threats with Fidelis EDR Technology
PPTX
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
PPTX
Database Security Risks You Might Not Have Considered, but Need To
PPTX
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
PDF
Threat intelligence Primary Tradecraft and Research
PPTX
Security Kung Fu: SIEM Solutions
PPTX
Community IT Webinar - IT Security for Nonprofits
PDF
Current & Emerging Cyber Security Threats
PDF
10 Security issues facing NZ Enterprises
PPTX
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
PDF
2010 State Of Enterprise Security
PPTX
Network Security
PPT
Competitive cyber security
PPTX
PPT
Understanding the need for security measures
PPTX
Lateral Movement by Default
PPTX
Cyber Security for the Small Business Experience
PPT
1st Russian CSO Summit Trends 2008
Aegis Personal Cybersecurity 101
Five things I learned about information security
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Database Security Risks You Might Not Have Considered, but Need To
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Threat intelligence Primary Tradecraft and Research
Security Kung Fu: SIEM Solutions
Community IT Webinar - IT Security for Nonprofits
Current & Emerging Cyber Security Threats
10 Security issues facing NZ Enterprises
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
2010 State Of Enterprise Security
Network Security
Competitive cyber security
Understanding the need for security measures
Lateral Movement by Default
Cyber Security for the Small Business Experience
1st Russian CSO Summit Trends 2008
Ad

Similar to Penetration Testing and Vulnerability Assessments: Examining the SEC and FINRA Requirements (20)

PDF
Careers in Cyber Security
PPTX
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
PDF
Cyber security series vulnerability assessments
PDF
Cybersecurity Basics - Aravindr.com
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PPTX
Assessing a pen tester: Making the right choice when choosing a third party P...
PDF
Top Security Challenges Facing Credit Unions Today
PPTX
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
PPTX
Ethical Hacking and Defense Penetration
PPTX
It security the condensed version
PPTX
nist_small_business_fundamentals_july_2019.pptx
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Chamber Technology Committee Presentation
PDF
CNIT 121: 2 IR Management Handbook
PPTX
Top Cybersecurity Challenges Facing Your Business
PDF
Penetration testing & Ethical Hacking
PPTX
CRI Retail Cyber Threats
PPTX
Career In Information security
PPSX
The myth of secure computing; management information system; MIS
Careers in Cyber Security
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Cyber security series vulnerability assessments
Cybersecurity Basics - Aravindr.com
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Assessing a pen tester: Making the right choice when choosing a third party P...
Top Security Challenges Facing Credit Unions Today
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Ethical Hacking and Defense Penetration
It security the condensed version
nist_small_business_fundamentals_july_2019.pptx
Track 5 session 1 - st dev con 2016 - need for security for iot
Today's Cyber Challenges: Methodology to Secure Your Business
Chamber Technology Committee Presentation
CNIT 121: 2 IR Management Handbook
Top Cybersecurity Challenges Facing Your Business
Penetration testing & Ethical Hacking
CRI Retail Cyber Threats
Career In Information security
The myth of secure computing; management information system; MIS
Ad

Recently uploaded (20)

PPTX
Daily stand up meeting on the various business
PPT
Chap8. Product & Service Strategy and branding
PDF
Budora Case Study: Building Trust in Canada’s Online Cannabis Market
PPT
chap9.New Product Development product lifecycle.ppt
PPTX
ENTREPRENEURSHIP..PPT.pptx..1234567891011
PPTX
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
PPTX
_From Idea to Revenue How First-Time Founders Are Monetizing Faster in 2025.pptx
PDF
Pollitrace pitch deck- Ai powered multiple species
PDF
AI Cloud Sprawl Is Real—Here’s How CXOs Can Regain Control Before It Costs Mi...
PDF
Investment Risk Assessment Brief: Zacharia Ali and Associated Entities
PDF
Chapter 1 - Introduction to management.pdf
PDF
initiate-entrepreneurship-in-healthcare-service-management-in-sierra-leone.pdf
PDF
Decision trees for high uncertainty decisions
PPTX
The Evolution of Search- Behaviour.pptx
PDF
Business Risk Assessment and Due Diligence Report: Zacharia Ali and Associate...
PDF
Why Has Vertical Farming Recently Become More Economical.pdf
PPTX
Peerless Plumbing Company-Fort Worth.pptx
PDF
Chapter 3 - Business environment - Final.pdf
PDF
Meme Coin Empire- Launch, Scale & Earn $500K-Month_3.pdf
PPTX
Process-and-Ethics-in-Research-1.potatoi
Daily stand up meeting on the various business
Chap8. Product & Service Strategy and branding
Budora Case Study: Building Trust in Canada’s Online Cannabis Market
chap9.New Product Development product lifecycle.ppt
ENTREPRENEURSHIP..PPT.pptx..1234567891011
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
_From Idea to Revenue How First-Time Founders Are Monetizing Faster in 2025.pptx
Pollitrace pitch deck- Ai powered multiple species
AI Cloud Sprawl Is Real—Here’s How CXOs Can Regain Control Before It Costs Mi...
Investment Risk Assessment Brief: Zacharia Ali and Associated Entities
Chapter 1 - Introduction to management.pdf
initiate-entrepreneurship-in-healthcare-service-management-in-sierra-leone.pdf
Decision trees for high uncertainty decisions
The Evolution of Search- Behaviour.pptx
Business Risk Assessment and Due Diligence Report: Zacharia Ali and Associate...
Why Has Vertical Farming Recently Become More Economical.pdf
Peerless Plumbing Company-Fort Worth.pptx
Chapter 3 - Business environment - Final.pdf
Meme Coin Empire- Launch, Scale & Earn $500K-Month_3.pdf
Process-and-Ethics-in-Research-1.potatoi

Penetration Testing and Vulnerability Assessments: Examining the SEC and FINRA Requirements

  • 1. PenetrationTest and Vulnerability Assessments: Examining the SEC and FINRA Requirements January 25, 2017
  • 2. Since 2003, SEC Compliance Consultants, Inc. (SEC3) has been helping organizations bridge the SEC, FINRA, CFTC, and NFA compliance knowledge gap. Meet John Lukan & SEC Compliance Consultants, Inc. • CA, CFA, CMT • Managing Director of SEC3 • 25 years experience providing fiduciary advice
  • 3. A boutique cybersecurity services company specializing in supporting NFA & SEC registrants under $3B AUM - primarily RIA’s, hedgefunds, CTAs, and CPOs. Meet Michael Brice & BW Cyber Services • Co Founder, Principal, Chief Security Officer • Financial Services Cyber Expert, Former CIO • B.S. Computer Science, NSATrained • 30 years of experience (classified & unclassified)
  • 4. Providing global businesses with the highest quality solutions to cybersecurity issues by utilizing a comprehensive prevent, defend, contain, and eradicate approach to threats. Meet Paul Caiazzo & TruShield Security Solutions • Co-Founder, CEO, Chief Security Architect • CISSP, CISA, CEH • M.S. in Information Security and Assurance • 15+ years of experience in Information Security
  • 5. SEC and FINRA PenTest Compliance Insight PenTesting Explained Penetration Testing (PenTesting) Webcast Objectives: Choosing a Qualified PenTest Vendor
  • 6. Office of Compliance Inspections and Examinations (OCIE) - 2017 Focus Section II. Assessing Market-Wide Risks • Cybersecurity: In 2017, we will continue our initiative to examine for cybersecurity compliance procedures and controls, including testing the implementation of those procedures and controls. Section IV. Protecting Retail Investors • Never-Before Examined Investment Advisers: We are expanding our Never-Before Examined Adviser initiative to include focused, risk-based examinations of newly registered advisers as well as of selected advisers that have been registered for a longer period but have never been examined by OCIE.
  • 7. SEC Case Study “RT Jones” • (RIA): $75k SEC fine • Rule 30(a) of Regulation S-P2 (the “Safeguard Rule”) for Cybersecurity • 3rd party vendor, hosting PII for over 100,000 individuals • Website hacked by unknown Chinese organization • R.T. Jones mitigation • Cybersecurity consultants, identity monitoring… • R.T. Jones consequences: • Despite mitigation - SEC concluded they violated the law, issued censured, and assessed $75k fine • SEC Message: The SEC made it clear that even in the absence of an actual attack or a security breach, the failure of a Fund Manager to design and implement a Cybersecurity Program is actionable.
  • 8. Nature of theThreat National States • Israel • Russia • China • North Korea • Iran Organized Crime • Eastern Europe • China • Others around the globe Hactivist/Hacktivism • Anonymous • Friends of Assange • Just about anyone with an agenda Script Kiddies • Your neighbor • The kid down the street • A guy or gal half-way around the globe Others • Competitor • Insider (purposeful) • Insider (accidental) • 3rd Party We are at war, and we are being beat badly… PenetrationTesting is our first line of defense against these threats, because if we don’t test – they will!
  • 9. SoWhat is a PenetrationTest and/or Vulnerability Assessment? • “PenTest” = Ethical Hackers • Act like a hacker • Look for ways to get into network • Look for ways to steal data • Look for ways to watch everything • Identify weakness in: o Operating systems o Applications o Passwords and remote accesses o Known software flaws • Automated programs that hackers use to identify security holes • Test your defenses • Trick your systems • Provide possible low security means for attack Vulnerability Assessment (Automated Process) PenetrationTesting (Manual Process) A PenTest combines automated tools with experienced “Testers” to probe your network (internally & externally) to find and exploit technical weakness and operational vulnerabilities +
  • 10. Vulnerability Scan Results Vulnerability Scanning: • Hundreds of tools available • Automated Scanning • Runs for hours/days • Looks at everything • Hundreds of pages output • No inherent analysis • Difficult to understand • Difficult to interpret • Difficult to prioritize EXAMPLEVULNERABILITY REPORT: 4 Lines of output from an example report that had over 200 results
  • 11. PenetrationTesting Results PenetrationTesting: • Dozens of tools available • Manual Probes • Runs for hours/days • Tester determines what to look at/probe • Output is less bulky • Analysis in involved • SHOULD BE Easy to understand • SHOULD BE easy to interpret • SHOULD BE easy to prioritize • SHOULD include keyVulnerability Scan results EXAMPLE PENETRATION REPORT: 5 Lines of output from an example report that had 25 results Apply the security patches and system hardening configuration changes as described inAppendix B of the SAR,including ensuring antivirus software and definitions are updated on all hosts Disable the firewall management interface from being accessible across the Internet Update the firmware to the SonicWALL firewall Apply a license to the SonicWALL firewall which enables many of the appliance-capable industry-standard security features such as Content Filtering,Anti-Virus,Anti-Spyware, Intrusion Prevention, and Botnet filtering Deploy real-time log collection and security monitoring solution that can correlate, aggregate, and alert on suspicious activity for border firewall, network appliances, servers, and endpoints
  • 12. What’s the Difference Between an External and/or Internal PenTest? External Testing: Internal Testing: WorkstationWorkstation Workstation Router or Firewall and Modem Your Company’s Data and Network Internet Connection Banging away at the webpage or firewall- trying to get in… WorkstationWorkstation Workstation Router or Firewall and Modem Your Company’s Data and Network Internal access is assumed- determining how much damage can now be done… Internet Connection
  • 13. Deliverables & Scope PenetrationTesting Deliverables Should Be: • Easy to understand report • Priority-oriented • In a format that can be provided to IT vendor and implemented with ease • Financially feasible recommendations • Focused on PII and other industry critical data You Should Avoid Deliverables that: • Contain 50+ pages of complex, esoteric recommendations • Required a PhD in Cybersecurity to understand and implement critical solutions • Provide “Million dollar solutions” for a “Thousand dollar problems” • Don’t understand your business/your industry
  • 14. WhatTo Look For in a “Pen Tester”  U.S.-based testers  PenTesters possess Government/DoD clearances  Experience with SEC/FINRA and NFA regulations  Findings presented in understandable format  Understand critical asset management related information, such as PII, Signals, and/or “Crown Jewel” data  Testing is tailored to asset management and not just a “one-size fits all” solution
  • 15. Questions    BW Cyber Services 703-675-2242 BWCyberServices.com info@bwcyberservices.com TruShield 877-583-2841 TruShieldInc.com info@trushieldinc.com SEC3 212-706-4029 SECCC.com info@seccc.com