100% found this document useful (1 vote)
369 views12 pages

Ey Cyber Risk Management

The document discusses challenges that banks face in managing cyber risk and oversight of cybersecurity. It notes that cyber risk remains a top concern despite investments in cybersecurity. It is difficult for boards to set tolerances due to the evolving nature of threats. Banks must balance security investments with an understanding of specific risks and how expenditures align with their risk appetite. Oversight requires identifying internal and external threats as well as addressing vulnerabilities in systems and data storage. Improving governance through board committees is an ongoing effort.

Uploaded by

leo5880
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
369 views12 pages

Ey Cyber Risk Management

The document discusses challenges that banks face in managing cyber risk and oversight of cybersecurity. It notes that cyber risk remains a top concern despite investments in cybersecurity. It is difficult for boards to set tolerances due to the evolving nature of threats. Banks must balance security investments with an understanding of specific risks and how expenditures align with their risk appetite. Oversight requires identifying internal and external threats as well as addressing vulnerabilities in systems and data storage. Improving governance through board committees is an ongoing effort.

Uploaded by

leo5880
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Cyber risk

management: the
focus shifts to
governance
Bank Governance Leadership
Network
April 2017
ViewPoints
April 2017

“The adversaries relevant to your firm come and go, but somebody is always trying
to hurt you. They range from hacktivists to organized crime to nation-states
playing a long game. This is a dynamic, asymmetric risk.”
– Participant
Cyber risk has attracted a great deal of attention in recent years, and banks have made
substantial investments in cybersecurity. Despite this, cyber risk and data security are still
the top operational risk concerns in 2017, according to a recent survey of risk
professionals.1 “The cyber threat is increasing by the day. All you have to do is pick up
a paper and you see the impact. It is a moving target that can only get worse,” said one
director. Indeed, media headlines are dominated by state actors hacking elections and
nefarious groups attacking a wide range of companies, with banks among the most
targeted.2 Customers, investors, and regulators all want assurances that boards understand
the risks and are doing the utmost to ensure banks are managing them.
Over several months, culminating with meetings on February 23 in New York and March
16 in London, Bank Governance Leadership Network (BGLN) participants shared
perspectives on the practical challenges that boards and risk management teams face in the
oversight of cybersecurity. This ViewPoints3 synthesizes the perspectives and ideas raised
in the meetings, as well as in nearly 30 conversations beforehand with directors,
executives, supervisors, and banking professionals.
.

Themes,
insights, and observations from those discussions are summarized in the following sections:
 Cyber vulnerability presents unique challenges for risk management and
oversight
 Regulatory authorities are becoming more prescriptive in defining cyber risk
expectations

Cybersecurity continues to be a particular challenge for board risk oversight, due to the
dynamic nature of the risk and the increasing vulnerabilities created by digital banking.
A participant observed, “All big financial institutions feel the vulnerability and are devoting
serious resources. We are plugged into different national and international agencies. I get
the sense we are doing as well as we can.” But how do boards know whether they are
doing enough? An executive warned, “Your patience will be exhausted before cyber risk
is effectively managed … We are not yet on top of it.” “Your patience
will be
Setting tolerances exhausted
Leaders of financial institutions generally acknowledge that it is impossible to make an before cyber
organization 100% invulnerable to cyber breaches. Many are now trying to determine risk is
their risk appetite, or tolerance, for various aspects of cyber risk. This task is challenging. effectively
One director acknowledged, “We are in breach of our risk appetite given the state of our managed.”
information security. [Our] ability to deal with threats that continually adjust is unclear.
We have done some things, but we are in breach, and we know it.” Some directors – Executive
questioned how they can ensure that appropriate steps are being taken to address cyber
risk. One conceded, “There is nothing else you can do except say you are looking into
remediation projects.” The particular challenge in setting a tolerance for cyber risk,
according to one participant, is that “cyber is an asymmetric risk. The bad guys only need
to be successful once. You have to be perfect all the time.” Furthermore, as one
participant observed, “Certain types of threats you cannot mitigate against. If a nation-
state uses previously unknown tactics specifically against you, you have to accept it.” This “The bad guys
challenge only highlights how important it is for boards and executive management teams only need to be
to understand the scope of the risks they are facing, the specific steps they should take to successful once.
mitigate them, and how the risk and mitigation efforts align with their risk appetite. You have to be
perfect all the
Understanding the investment needed
time.”
“If you recognize there will be cyber attacks, that your tolerance can never be zero, then
the question is how much are you willing to spend? The investment is massive,” said one – Participant
participant. Another shared some historical context: “If you go back five years, a lot of
large banks acquired major capabilities in cybersecurity. They spent a lot of money. Yet,
there are still a lot of data breaches. Why? The capabilities were not mature, and they
were implemented in silos. A lot of the interconnectivity is where we see weaknesses.
It created new avenues for attackers.” The result of this continued vulnerability is that
many boards have the impression that their chief information security officer (CISO) is
“always telling us that cyber is a disaster and we need all this money,” reported one
participant. An executive acknowledged, “As risk professionals, we have to give the board
a better way to measure progress, or they will lose patience,” but added,“At the moment, “… That CISO
we do need a surge in investment, and that CISO who keeps asking for more money who keeps
really does need it.” Increasingly, many large banks are investing heavily in tools like asking for more
automated correlation engines, which collect and digest large amounts of data from many money really
different sources to predict, identify, and respond to cyber attacks.4 does need it.”
Although directors expressed frustration at their inability to measure the effectiveness of
cyber expenditures, one director cautioned against an excessive focus on precise – Executive
measurement, saying, “We need to keep in mind the overall purpose of the exercise,
rather than get caught up in ‘Can I attach X dollar amount to managing it better?’”
Identifying threats and addressing vulnerabilities
Keeping up with the constantly evolving cyber threat remains a formidable challenge.
Directors do not need to become experts in cybersecurity, but they do need to understand
the risk to their firms and the appropriate responses. Experts distinguish threats originating
with vandals or hacktivists looking to cause disruption; criminals seeking money, often
through ransomware; spies seeking intellectual property; saboteurs looking to cause real
damage; and slackers – employees who are simply lazy and do not follow security
protocols. A participant noted, “Each attacker’s motivation leads you down different
defensive paths.”
Adding to the complexity, a participant noted, “Cyber attacks are not binary in their
success. It takes a long time to be successful.” Because eventual breaches are inevitable, “As we
managing cyber risk is not just about protecting the perimeter but also about “how you encourage more
defend, respond, and recover. It is the full cycle.” That involves reviewing practices like innovation,
how system backups are structured and where backup data is stored. A participant noted, more people are
“Most networks were built to encourage cross selling and easy navigation, so it is easy to putting data in
get in.” This means that firms have to consider ways to “box in the risk” – for example, places the [chief
by “changing the economics so it is more expensive for the attacker to be successful” once information
inside. They might also use fake servers as decoys, or think about how firewalls are used officer] doesn’t
between servers. A participant warned, “Attackers are smart; they watch the process. even know.”
They might even attack the backup first.” Participants were also concerned about where
and how data is being stored. A director said, “As we encourage more innovation, more – Director
people are putting data in places the [chief information officer] doesn’t even know.”
As more banks move data to the cloud, directors should consider whether the cloud is
private or public and what jurisdiction the cloud is in.
Perhaps more worrying than individual bank vulnerabilities are threats to the system.
A participant observed, “We haven’t seen many major cyber attacks yet because terrorists
haven’t really moved to cyber. Nation-states have, but it is easier to deter nation-states.
Terrorists’ goal is to induce terror. You can induce disruption, but it is hard to induce
terror through cyber attacks. But it is only a matter of time.” The market for advanced
cyber tools is growing, and some organizations are advertising sophisticated hacking tools
available to the highest bidder. The same participant observed, “It is not a lack of tools
or ability. It is a lack of motivation and sophistication.” One participant warned that
criminals are “becoming more interested in attacking the Internet infrastructure itself.”
Improving governance and oversight
Firms have adopted different approaches for handling oversight of cyber risk. Some are
sharing primary board responsibility among technology and risk committees. Others have
established special subcommittees focused specifically on cyber. Most have a single
accountable officer responsible for cyber resilience, often a CISO. The reporting structure
for this officer, however, remains a source of disagreement. “Some say the CISO should
report to the chief risk officer. I’m thinking, what are you doing? The risk exists because
of IT. If it were me, I would want to be sure cyber remained a responsibility with
reporting to the CIO,” argued one director.
Participants highlighted the following ways in which boards can make meaningful
contributions to good governance:
 Encouraging an organization-wide culture of cyber-awareness. A recent
article in The Economist describes why improving cybersecurity can pose a cultural “You don’t need
challenge: “It is tempting to believe that the security problem can be solved with yet 100% of
more technical wizardry and a call for heightened vigilance … That requires a kind of employees to
cultivated paranoia which does not come naturally to non-tech firms.”5 This is avoid clicking on
particularly critical as recent data suggests that employee negligence or malicious acts a phishing link;
account for nearly two-thirds of cyber breaches.6 A participant asked, “How can you you just need
create resilience in the DNA of the culture so that everybody knows the consequences one person to
of their actions? Eventually people have to think about cyber as a fundamental skill report it.”
set. Not that they need to be an expert, but that they need to have situational
awareness.” Another said, “Security is always a trade-off … The goal is to change the – Participant
mind-set from one focused on not making any mistakes to instead thinking about
turning all of your employees into sensors. You don’t need 100% of employees to
avoid clicking on a phishing link; you just need one person to report it.” Another
focused on controls and broadening risk management responsibility: “One of the
challenges is the translation of these risks to an effective control strategy. The drive is
toward giving responsibilities across the three lines of defense. That was not previously
the case.”
 Increasing access to cyber expertise. Most boards are experimenting with new
governance structures, such as special committees, and bringing cybersecurity advisers
into those committees or adding an advisory committee, and considering how best to
divide oversight responsibility among committees and the full board. Other boards are
adding directors with cyber expertise. One director commented, “We have a cyber
expert who has no financial institutions experience, so there is a back and forth on
understanding how the business works. The value is the ability to interface with the
CISO. They speak the same language and can convey that to the board.” Directors
cautioned against too much reliance on specialists on the board, however. One
asserted, “You can’t have a board member to understand every technological
development. It is more about having access to experts.”
 Ensuring accountability and prioritization at senior executive level. One
participant advised, “Keep the pressure on. I know there is a CISO at every bank.
Everybody thinks they are paying attention to cyber, but where the rubber meets the
road, they often fail the test, especially if cybersecurity conflicts with a business
priority.” Another participant noted, “One of the hardest groups to manage are top
executives. Are there exceptions for them on security? If so, push on whether they
are needed … The CEO doesn’t need superuser access.”
 Developing robust response and recovery plans. Participants agreed that banks
should focus on reducing the impact of inevitable cyber incidents, by developing
appropriate response plans and using scenarios to prepare. A director elaborated:
“Often, we at the board hear about what might have happened in terms of a cyber
breach, and you go into your ‘what happened?!’ moment. But it might be six months
before you really know what happened and how and why. Spending resources is really “If we say
about reducing that period.” Scenario planning and “war-gaming” can help, though something and it
the specifics will rarely align with real events. Part of the priority for a board is to turns out to be
understand their role in an incident. For example, how long should the board wait untrue, we lose
before alerting the public of a significant breach or loss of data? One asked, “Assume the confidence
there is a significant breach, maybe a ransomware attack. Do you pay the ransom, and of the wider
when do you tell the customer?” Another complained of mixed messages: “You have system.”
regulators saying, ‘Tell the customers,’ and police saying, ‘Don’t say anything.’”
A regulator clarified, “Feedback to the outside world is complex, and people will make – Regulator
assumptions. Banks are different. It is all about trust and safety. We err on the side of
safety. If we say something and it turns out to be untrue, we lose the confidence of
the wider system. We think about our role in the response. We do think we have to
work together.”

Some analysis suggests that the financial sector outpaces other sectors in cybersecurity
preparedness, owing to dramatically increased investments in defensive measures.7
Nevertheless, many policymakers are concerned that the sector is not going far enough.
Sarah Bloom Raskin, former US Treasury Deputy Secretary, noted that while the financial
services industry may be ahead of other sectors, it still has a long way to go, and said that
“there are well-documented best practices out there” that have not been universally
adopted.8 Certainly there is no shortage of frameworks and guidelines: a recent report
suggested that regulators at the various levels, along with industry bodies, have “issued or
proposed 43 differing cybersecurity frameworks, questionnaires, rules, and requirements
applicable to the financial services sector.”9 Apart from regulatory guidance, many firms
are already implementing norms, such as the National Institute of Standards and
Technology (NIST) framework.10 A supervisor reported that banks still have to improve
to meet the NIST standards: “We have done exam work relative to the NIST framework.
We have not seen any systemic firm where we saw something that we really liked. The
average bank is not where we would like it to be. They are struggling on some
foundational issues.”

New cyber regulations in the United States shift the focus to governance and
controls
In the United States, the Federal Deposit Insurance Corporation, the Office of the
Comptroller of the Currency, and the Federal Reserve have jointly proposed enhanced
cyber risk management standards for financial institutions in the form of an advance notice
of proposed rulemaking (ANPR). According to an EY briefing report, the proposed rules
require the development of a board-approved cyber risk management strategy, as well as
a board-approved cyber risk appetite. In addition, firms will be obliged to take an
inventory of all business assets and their criticality, along with the ability to monitor in
real-time all external dependencies.11 Some directors criticized the ANPR as further
reaching and more prescriptive than prior guidance from regulators, but one participant
noted that as the first step in a multi-phase consultative process, the initial proposal was “Previously,
deliberately designed to be very broad in order to garner feedback, whereas the final rules cyber regulation
were likely to be more limited. Most directors agreed that the proposed standards do not was all about
create new or vastly expanded expectations beyond what boards are already doing so much prevention.
as clarify specific responsibilities. The standards do demonstrate a new focus for regulators: This is about
a participant noted, “Previously, cyber regulation was all about prevention. This is about governance
governance models.” models.”
A participant went into more detail: “In the ANPR, there are descriptions about the three
lines of defense and the second line getting access to the board. It is all about getting the – Participant
first and second line working together. Then you have internal audit validating that the
cyber risk framework is complying with the regulations … ANPR is clear on the board
keeping management on top of it … A lot of it is quite reasonable, but it is the scope that
is the issue. They are really pushing you to understand the supply chain, for example.”
Another summarized, “The ANPR is setting clear lines to push cyber throughout the
organization. For example, if you make an acquisition, how are you thinking about its
cyber risk implications? They want to make sure cyber risk is managed, not accepted. It
is about enlightening people to think about cyber from an end-to-end perspective.”
The ANPR is a by-product of discussions among G7 regulators and policymakers. As a
result, it is likely other national regulators will follow with similar requirements – perhaps
not as prescriptive, but based on a similar set of agreed principles.

Data regulations are coming in Europe


In Europe, the new European General Data Protection Regulation will come into force
in May of 2018. A participant commented, “This is the really scary one because of the “… You need to
fines. It is all about protecting EU citizens’ data. If you operate in the EU, you need the constantly be
right processes in place. Depending on the type of breach, it could cost you up to 4% of state-of-the-art,
your annual revenue.” Participants were warned not to underestimate the significance of and the state of
these requirements: “At most companies, legal is pushing the response. But the strategic the art is
challenges are so broad. If you don’t go about it the right way, you could be in trouble constantly
… It will affect everyone,” warned one participant. changing.”

Directors accept heightened expectations, but encourage regulators to avoid – Director


duplication
Some participants submitted that regulators have no choice but to load accountability onto
banks and their boards. One director remarked, “I don’t think the regulators know
enough about the technical aspects of the issue. I think they hide behind the rigors of
regulatory structure to call for monitoring, governance, and accountability as opposed to
focusing on the nuts and bolts. But I do think it is right to force financial institutions to
have this discussion themselves.” Another said, “We all know the regulatory expectations
are vastly up, even before these new rules are finalized. The general expectation is that
you need to constantly be state-of-the-art, and the state of the art is constantly changing
… We are told a whole new generation of things need to happen.”
Despite this general acceptance, participants advised regulators to focus on efforts that can
make a positive impact and raise standards. One director cautioned, “Most of us use NIST “Do our boards
as a starting point. If the guidance moves away from that, then they would need to be take real
clear on why they are doing so. There are like 65 regulators around the world coming business
out with guidance on this. It is a pretty complicated tapestry.” ownership of the
*** deep
implications of
A subject matter expert predicts that cybersecurity is becoming the “master problem” of cyber risk? … It
the era – an existential challenge similar to climate change in its significance and impacts really
consequence, which will require massive resource commitments in the next few years.12 big strategic
In the past, cybersecurity was often viewed as a technical problem to be addressed choices.”
primarily by technology, rather than as a strategic threat to be addressed by the board.
Those days are over. As technology is increasingly embedded in all aspects of banking, – Participant
cyber risk is expanding, requiring more and more board attention. A participant outlined
the significance of cybersecurity and related issues for bank leaders: “Can the chairman or
CEO stand up to investors and say, ‘We are not going to focus on protecting against this
risk or that,’ or that they decided to slow down customer innovation because it is
increasing the cyber risk profile? Or take a stance on data collection? Do our boards take
real business ownership of the deep implications of cyber risk? Or are we just, as one
participant suggested, being ‘updated at’ by the technology community? It impacts really
big strategic choices.”
The perspectives presented in this document are the sole responsibility of Tapestry Networks and do not necessarily reflect the views of any individual
bank, its directors or executives, regulators or supervisors, or EY. Please consult your counselors for specific advice. EY refers to the global
organization and may refer to one or more of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst &
Young Global Limited, a UK company limited by guarantee, does not provide services to clients. This material is prepared and copyrighted by
Tapestry Networks with all rights reserved. It may be reproduced and redistributed, but only in its entirety, including all copyright and trademark
legends. Tapestry Networks and the associated logos are trademarks of Tapestry Networks, Inc., and EY and the associated logos are trademarks of
EYGM Ltd.
In February and March of this year, Tapestry and EY hosted two BGLN meetings on the challenges in
overseeing non-financial risk in a period of rapid technological, business model, and operating model
change, and had over 50 conversations with directors, executives, regulators, supervisors, and other thought
leaders. Insights from these discussions informed this ViewPoints and unattributed quotes from these
discussions appear throughout.
The following individuals participated in BGLN discussions on the changing nature of non-financial risk:

 Clare Beale, Global Head of Independent  Betsy Duke, Independent Vice Chair, Wells
Model Review, HSBC Fargo

 Bill Bennett, Risk Committee Chair, TD  Douglas Flint, Chair of the Board, HSBC
Bank  Tom Glocer, Operations and Technology
 Win Bischoff, Chairman, JP Morgan Securities Committee Chair, Morgan Stanley

 Lord Norman Blackwell, Chairman of the  Nick Godfrey, Managing Director and Co-
Board and Nomination & Governance Chief Information Security Officer, Goldman
Committee Chair, Lloyds Banking Group Sachs

 Jonathan Bloomer, Non-Executive Director,  Byron Grote, Non-Executive Director,


Morgan Stanley International Standard Chartered

 Chantal Bray, Global Head of Pension Risk,  Mike Hawker, Remuneration Committee
HSBC Chair, Macquarie

 Juan Colombás, Executive Director and Chief  Bob Herz, Audit Committee Chair, Morgan
Risk Officer, Lloyds Banking Group Stanley

 David Conner, Risk Committee Chair,  Olivia Kirtley, Risk Management Committee
Standard Chartered Chair, US Bancorp

 Sir Sandy Crombie, Senior Independent  Axel P. Lehmann, Group Chief Operating
Director and Performance and Remuneration Officer, UBS
Committee Chair, RBS  John Lipsky, Non-Executive Director, HSBC
 Sir Howard Davies, Chair of the Board and  Rachel Lomax, Senior Independent Director
Nominations and Governance Committee and Conduct & Values Committee Chair,
Chair, RBS HSBC
 Nick Donofrio, Non-Executive Director,  Douglas Lyons, Chief Credit Officer, Nomura
BNY Mellon International
 Noreen Doyle, Vice-Chair of the Board and  Deborah McWhinney, Non-Executive
Lead Independent Director, Credit Suisse Director, Lloyds Banking Group
 Dina Dublon, Risk Committee Chair,
Deutsche Bank
 Scott Moeller, Risk Committee Chair,  Bruce Richards, Senior Vice President and
JPMorgan Securities Head of the Complex Financial Institutions,
Federal Reserve Bank of New York
 Andy Ozment, Co-Chief Information Security
Officer, Goldman Sachs  Molly Scherf, Deputy Comptroller, Large
Bank Supervision, Office of the Comptroller
 Bill Parker, Vice Chair and Chief Risk
of the Currency
Officer, US Bancorp
 Todd Vermilyea, Senior Associate Director,
 Kevin Parry, Audit Committee Chair,
Division of Supervision and Regulation,
Nationwide Building Society
Federal Reserve System
 Nathalie Rachou, Risk Committee Chair,
Société Générale
 Susan Segal, Corporate Governance  Omar Ali, Managing Partner, UK Financial
Committee Chair, Scotiabank Services

 Alexandra Schaapveld, Audit and Internal  Peter Davis, Americas Financial Services
Control Committee Chair, Société Générale Advisory Leader

 David Sidwell, Senior Independent Director  Marie-Laure Delarue, EMEIA Banking and
and Risk Committee Chair, UBS Capital Markets Leader

 Tim Tookey, Risk Committee Chair,  John Doherty, Partner, Governance Risk and
Nationwide Building Society Compliance

 Jasmine Whitbread, Brand, Values & Conduct  Steve Holt, Partner, FS Advisory
Committee Chair, Standard Chartered  Ertem Osmanoglu, Americas Deputy
Cybersecurity Leader
 Isabelle Santenac, EMEIA FSO Assurance
 Jonathan Davidson, Director of Supervision,
Managing Partner
Retail & Authorizations Division, UK
Financial Conduct Authority  Bill Schlich, Global Banking and Capital
Markets Leader
 Harald Heide, Head of Section in DG-
MS1/6a, European Central Bank
 Lyndon Nelson, Deputy CEO & Executive  Dennis Andrade, Partner
Director, Regulatory Operations and
Supervisory Risk Specialists, Bank of England  Jonathan Day, Vice Chairman
Prudential Regulation Authority  Colin Erhardt, Associate
 Stephen Page, Non-Executive Director, BSI
Group and the National Crime Agency
1 “Top 10 Operational Risks for 2017,” Risk.net, January 23, 2017.
2 Emma Dunkley, Caroline Binham, and Sam Jones, “Overseas Cyber Attackers Targeted Lloyds,” Financial Times, January 22, 2017.
3
ViewPoints reflects the network’s use of a modified version of the Chatham House Rule whereby comments are not attributed to individuals,
corporations, or institutions. Network participants’ comments appear in italics.
4 Steven Norton, “Wells Fargo CISO Says Cyber Investments Pointing Way to Better Risk Management,” CIO Journal (blog), Wall Street Journal,

March 13, 2017.


5 “How to Manage the Computer Security Threat,” Economist, April 8, 2017.

6 “Effective Cybersecurity Strategy Rests on People, Not Just Technology,” Insurance Journal, March 1, 2017.

7 Jonathan Cedarbaum and Sean Reilly, “Cybersecurity Collaboration: Routes to Stronger Defenses,” Banking Perspective 3, no. 1 (2015), 66.

8
Martin Arnold, “Finance Sector Urged to Ramp up Cyber Defences,” Financial Times, December 8, 2016.
9
Lalita Clozel, "Big Banks to Regulators: Don't Tread on Our Cybersecurity Efforts," American Banker, March 1, 2017.
10
National Institute of Standards and Technology, “NIST Releases Update to Cybersecurity Framework,” news release, January 10, 2017.
11 EY, “Enhanced Cyber Risk Management Standards for Financial Institutions,” Financial Services regulatory alert, October 2016.

12 Eli Sugarman, “Four Questions for Steven Weber on Cybersecurity Futures 2020,” Hewlett Foundation, May 23, 2016.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy