Cybersecurity101 2019 Final With Links
Cybersecurity101 2019 Final With Links
CYBERSECURITY:
I am proud to present to you the revised Conference of State Bank Supervisors (CSBS) Executive Leadership
of Cybersecurity (ELOC) Resource Guide, or “Cybersecurity 101.”
The number of cyber-attacks directed at financial institutions of all sizes continues to grow. Addressing new
threats requires a concerted effort by Chief Executive Officers (CEOs), Presidents, and Board Members.
Several years ago CSBS, on behalf of state regulators, launched the ELOC Initiative to engage bank
executives and provide them with the tools to address cybersecurity threats.
Since its initial publication, “Cybersecurity 101” has served as a valuable resource for countless bank
executives. In this update, however, you will notice several changes. Most notably, we removed previously
included technical information, such as detailed instructions for activities performed by your IT and
information security personnel. They will be incorporated into appendices and made available separately.
The guide has also been updated to address both bank and nonbank institutions. We intend this document
as a reference for both the banks that have formed the cornerstone of our economy for hundreds of years,
as well as the emerging technologies shifting our industry in exciting and challenging ways.
This guide is tailored to furnish Executives with the necessary tools to better understand and prepare for
the threats faced by their institutions.
Thank you for taking the initiative to make your institutions, your customers, and your communities safer
while online. Your leadership, determination, and willingness to adapt are instrumental to maintaining a
robust, secure financial system.
Sincerely,
John W. Ryan
President & CEO, Conference of State Bank Supervisors
CONTENTS
Introduction.................................................................................................................. 3
Common Threats.............................................................................................. 5
Identify.............................................................................................................. 8
Identifying Threats............................................................................... 8
Measuring Risk................................................................................... 10
Communicating Risk.......................................................................... 10
Protect............................................................................................................. 12
Detect.............................................................................................................. 17
Respond.......................................................................................................... 18
Recover........................................................................................................... 21
Glossary....................................................................................................................... 22
Resources.................................................................................................................... 23
2 CYBERSECURITY 101
INTRODUCTION
Financial institutions collect and protect highly sensitive information every day. The financial
services industry is a vital component of the nation’s critical infrastructure—banks and
nonbank financial institutions are the cornerstones of local communities, intrastate
commerce, and the U.S. economy.
As CEOs, Executives, and/or Board Members, you This guide addresses challenges faced by both
have the responsibility to adequately protect the bank and nonbank (also referred to as “non-
money and information entrusted to you by your depository”) institutions. It is intended as an
consumers; losing the trust of your employees and easily digestible, non-technical reference guide
customers puts your institution at risk. to help executives develop a comprehensive,
responsive cybersecurity program in line with
Cyber risks, like reputational and financial risks, best practices. As each institution is different, the
threaten an institution’s bottom line. Attacks advice in this guide can be easily customized to
can be costly and compromising to customer meet your organization’s unique threats, priorities,
confidence, and the institution may even be and challenges. While this resource guide does
held legally responsible. Beyond the impact to not guarantee prevention, it attempts to identify
an individual organization, though, cyber-attacks various resources—people, processes, and tools
also have far-reaching economic consequences. and technologies—that, when properly leveraged,
Due to the inherent interconnectedness of work to reduce your cybersecurity risk.
the internet, a security breach at one financial
institution can pose a significant threat to market It is our hope that this guide serves as a starting
confidence and the nation’s financial stability, point to sustained collaboration between financial
as well as to other financial institutions. But in institutions and regulators. Together we can
this time of technological advancement and safeguard against new, persistent cybersecurity
interconnectedness, it can be challenging to know threats and contribute to a stable, prosperous
how to best defend your institutions. With limited economy.
resources, how can risks be prioritized?
CYBERSECURITY 101 3
What Do We Mean
When We Talk About Risk?
Risk is the likelihood and potential magnitude of harm. It lies at the nexus of two
important information security concepts: threats and vulnerabilities.
4 CYBERSECURITY 101
IT IS IMPOSSIBLE TO PROTECT AGAINST
ALL VULNERABILITIES.
Common Threats
Phishing Attacks prey on a user’s sense of
responsibility, empathy, or urgency to trick
him or her into sharing credentials with
an unauthorized user, usually via email or
telephone.
CYBERSECURITY 101 5
Questions Every CEO Should Ask
Although cybersecurity was once considered solely an information technology (IT) concern,
the increase in frequency and sophistication of cyber-attacks demands a shift in thinking.
For a cyber program to be truly effective, it must involve the CEO, Board Members, and other
senior executives in addition to information security and IT professionals.
6 CYBERSECURITY 101
HOW TO STRUCTURE YOUR
INFORMATION SECURITY PROGRAM
Your information security program will be shaped by your organization’s unique
needs and business processes. There is no one-size-fits-all solution. The Cybersecurity
Framework (CSF), published by the National Institute for Standards and Technology
(NIST), is a flexible, adaptable tool for organizing any information security program,
regardless of size and resources. Although an institution will never be completely
invulnerable, organizing your bank or non-bank cybersecurity program around the
NIST CSF supports a comprehensive level of risk management.
The Framework organizes cybersecurity into five core “Functions,” each of which
represents a collection of behaviors: Identify, Protect, Detect, Respond, and Recover.
Please note the Federal Financial Institutions Examination Council (FFIEC) provides a mapping
of the FFIEC Cybersecurity Assessment Tool (CAT) to the NIST CSF for ease of coordination and
communication. Find out more at https://www.ffiec.gov/pdf/cybersecurity/FFIEC_CAT_App_B_
Map_to_NIST_CSF_June_2015_PDF4.pdf.
CYBERSECURITY 101 7
IDENTIFY
The Identify function helps establish what your organization must protect. Identify activities
include determining what assets—both physical and informational—are present within your
institution; how they fit in within the business environment; and the governance in place to
manage your organization’s regulatory, legal, and operational environments.
8 CYBERSECURITY 101
FS-ISAC FOR FINANCIAL INSTITUTIONS
FS-ISAC offers a basic membership for community banks with less than $1 billion
in assets which includes the “must-have” services shown below. Non-banks can
also obtain FS-ISAC membership. To receive only the most critical public alerts,
the smallest community-based institutions may elect to register as a Critical
Notification Only Participant (CNOP). This service is offered free-of-charge but
only provides notification of public urgent and crisis alerts. Learn more at
https://www.fsisac.com/join.
• Community Bank FS-ISAC members have access to the FS-ISAC Security Tool
Kit, a 72-page document developed collaboratively with community institutions
designed to provide a set of security practices to help strengthen banks’
information security programs in light of increasing threats.
CYBERSECURITY 101 9
Data Breach Investigations Report and Symantec’s
Internet Security Threat Report. Both reports are
updated annually.
10 CYBERSECURITY 101
KEY “IDENTIFY” POINTS
CYBERSECURITY 101 11
PROTECT
Once institutional threats are identified, the next step is to ensure your financial institution has
safeguards commensurate with your risk profile. The Protect function includes establishing
physical and information security controls, employee training programs, and operational
processes that work to ensure your information and assets remain safe. Protection activities can
be physical, such as behavioral processes, or technical, like automated tools.
Incorporate cybersecurity into your human Another common threat vector is less secured
resources and IT acquisition processes. Planning vendors that are given access to your systems.
ahead reduces the likelihood of a catastrophic Vendor management should include security
event occurring, as well as associated mitigation reviews of vendors with system access and specify
costs. Do not store all crown jewels in one place contractual requirements that vendors protect your
and ensure backup copies of data are stored in a information at least as well as you do.
secure, separate location. For more information
on information and business recovery planning, as
well as to explore backup agreements with other
institutions, please visit Sheltered Harbor at
SHELTERED HARBOR:
https://shelteredharbor.org.
RECOVERY OF LAST RESORT
Malicious actors often gain access to valuable
resources due to avoidable human error, so Sheltered Harbor is an organization
ensure your employee training program includes dedicated to protecting financial
cybersecurity best practices and social engineering information from permanent loss through
exercises. All attempts should be made to enact
the same safeguards and protections at all work
the establishment of best practices and
locations, including telework and remote locations. a secure backup program for critical
Your protection processes should be regularly institutional customer account data. In
updated, whenever your business environment
the event of a cyber-attack, Sheltered
changes or if a vendor informs you of an identified
weakness. Test the effectiveness of protection Harbor can transmit a victim institution’s
tools and processes, whether by internal audits critical data to a partner organization, who
and scanning and/or by engaging the services of a will temporarily resume critical financial
penetration tester.
services until the original provider’s
functions are restored.
12 CYBERSECURITY 101
FIGURE 2: CIS Top 20 Controls
The Center for Internet Security (CIS) publishes an annual list of the 20 controls most vital to
a robust cybersecurity program. Institutions that effectively incorporate these controls are
taking important steps to protect themselves and their consumers. CIS also makes available
a Controls Self-Assessment Tool (CSAT) to help institutions determine how effectively the
controls are applied. Learn more at https://www.cisecurity.org/cybersecurity-tools.
CYBERSECURITY 101 13
CYBERSECURITY STAFF TRAINING RESOURCES
The National Cyber Security Alliance (NCSA) website covers safety basics at:
https://www.staysafeonline.org.
Check the security of your devices using free tools, made available by the NCSA at:
https://staysafeonline.org/stay-safe-online/free-online-security-checkups-tools.
https://www.sba.gov/course/cybersecurity-small-businesses.
14 CYBERSECURITY 101
CYBERSECURITY AND HUMAN RESOURCES
CYBERSECURITY 101 15
USEFUL PROTECTION TOOLS
16 CYBERSECURITY 101
DETECT
CYBERSECURITY 101 17
RESPOND
Detecting an incident is less useful if your organization does not know how to respond.
An incident response plan is an organized approach to addressing and managing a security
breach or attack. The incident response plan should include a policy that defines what
constitutes an incident, and it should provide a step-by-step process that should be followed
when an incident occurs.
18 CYBERSECURITY 101
INCIDENT RESPONSE GUIDE
A comprehensive guide on forming and executing an incident response plan is available from
NIST at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf.
An incident response plan should include: For incident response best practices
information on how to form and execute a
• Steps that may be taken to address
plan, please refer to:
potential damage and to limit the loss
of resources, including any required • NIST Computer Security Incident
timelines or Service Level Agreements Handling Guide at:
(SLAs); https://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-61r2.
• Contractual or regulatory reporting
pdf; and
requirements;
• “Cyber Incident Response Guide”
• Projected time and resources required to
published by the Multi-State Information
implement the response strategy; and
Sharing & Analysis Center at:
• A communications plan that incorporates: https://msisac.cisecurity.org/resources/
– w
hen and if you should report a breach guides/documents/Incident-Response-
to the media and/or notify affected Guide.pdf.
individuals;
– the preferred medium for notification;
– basic guidelines for tracking and
analyzing media coverage; and
–a process for notifying employees of
the incident and instructing them about
immediate containment steps.
1. R
ecord the date and time when the breach
was discovered, as well as the current date
and time when response efforts begin, i.e.
when someone on the response team is
ESTABLISH LEGAL KNOW YOUR LEGAL alerted to the breach.
REPRESENTATION AND CONTRACTUAL
AHEAD OF TIME. REPORTING 2. A
lert and activate everyone on the response
RESPONSIBILITIES. team, including external resources, to begin
Breach counsel will executing your preparedness plan.
help your organization Determine if any
navigate response internal, external, or 3. S
ecure the premises around the area where
activities, liabilities, agency stakeholders the data breach occurred to help preserve
and legalities, all while must be notified within evidence, if necessary.
maintaining attorney- a specified timeframe.
client privilege. 4. S
top additional data loss. Take affected
machines or servers offline.
5. D
ocument everything known about the
breach. Who discovered it? Who reported it?
To whom was it reported? Who else knows
about it? What type of breach occurred? What
was stolen? How was it stolen? What systems
are affected? What devices are missing?
PRACTICE MAKES ESTABLISH AND
PERFECT! MAINTAIN KEY LAW 6. I nterview those involved in discovering the
ENFORCEMENT breach and anyone else who may know about
Run through your
POINTS OF it. Document your investigation.
incident response plan
at least annually with CONTACT,
7. R
eview protocols regarding disseminating
all team personnel. including local police,
information about the breach for everyone
Adjust your plan for the Federal Bureau
involved in this early stage.
different types of cyber of Investigation (FBI),
incidents. and the United States
8. A
ssess priorities and risks based on what
Secret Service (USSS).
you know about the breach.
10. N
otify law enforcement, if needed, to begin
an in-depth investigation.
20 CYBERSECURITY 101
RECOVER
After your institution has taken steps to respond to a cyber incident, the next step is the
Recover phase.
Recovery includes public relations activities By the end of the recovery period, your
undertaken to mitigate reputational risk, infrastructure, data, and services should all be
the resolution of internal and stakeholder restored. This may take anywhere from hours to
communications, and the updating of your weeks, but with proper planning it should occur
recovery plans with lessons learned. within the predicted timeline.
CYBERSECURITY 101 21
Glossary
Crown Jewels – An organization’s most critical information assets
Cybersecurity – The ability to protect or defend the use of cyberspace from cyberattacks
Denial of Service – An attempt to overwhelm a website or tool with requests so it becomes useless
Information Availability – Information and information systems are accessible and reliable
Insider Threat – A threat posed by employees, vendors, and people close to the business, either on
purpose or by accident
Phishing – An attempt to prey on a user’s sense of responsibility, empathy, or urgency to trick him or her
into sharing credentials with an unauthorized user
Ransomware – An attack that encrypts valuable computer resources and holds them hostage until a
ransom is paid
Risk Assessment – An evaluation of the threats faced by an institution, the likelihood they will happen, and
the magnitude of harm should they occur
Threat – A force, organization, or person with the potential to obtain, compromise, or destroy an
information asset
Vulnerability — A weakness
22 CYBERSECURITY 101
BY THE END OF THE RECOVERY PERIOD,
YOUR INFRASTRUCTURE, DATA, AND SERVICES
SHOULD ALL BE RESTORED.
Resources
DISASTER RECOVERY
Sheltered Harbor
https://www.shelteredharbor.org/
FRAMEWORKS
The Center for Internet Security’s (CIS) 20 Critical Security Controls
https://www.cisecurity.org
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
https://www.nist.gov/cyberframework
INFORMATION SHARING
The Center for Internet Security (CIS) Controls Self-Assessment Tool (CSAT)
https://www.cisecurity.org/blog/cis-csat-free-tool-assessing-implementation-of-cis-controls/
CYBERSECURITY 101 23
Symantec 2019 Internet Security Threat Report 2019
https://www.symantec.com/security-center/threat-report
PENETRATION TESTING
Department of Homeland Security – Free
https://krebsonsecurity.com/2015/12/dhs-giving-firms-free-penetration-tests/
24 CYBERSECURITY 101
THE CONFERENCE OF STATE BANK SUPERVISORS
www.csbs.org / @csbsnews