24
February 2, 2016 | Chicago NFA Cybersecurity Workshop

February 2, 2016 | Chicago NFA Cybersecurity Workshop

Embed Size (px)

DESCRIPTION

 Members may use electronic means to:  Collect and maintain customer information, including personally identifying information (PII)  Enter customer, counterparty and proprietary orders  Websites available to customers and counterparties for:  Opening accounts  Trading  Accessing account information Technology is Everywhere

Citation preview

Page 1: February 2, 2016 | Chicago NFA Cybersecurity Workshop

February 2 , 2016 | Ch icago

NFA Cybersecurity Workshop

Page 2: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Background and overview NFA Cybersecurity Interpretive Notice ISSP policy development Resources: Audio from this conference will be available

on NFA’s website in mid-February Expert panel: Lessons learned NFA panel: What to expect during NFA's exam process Questions

Today’s Agenda

Page 3: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Members may use electronic means to: Collect and maintain customer information, including

personally identifying information (PII) Enter customer, counterparty and proprietary orders

Websites available to customers and counterparties for: Opening accounts Trading Accessing account information

Technology is Everywhere

Page 4: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Daily reports of cybersecurity attacks Hackers Phishing attempts Internal breaches

Cybersecurity is everyone’s responsibility Necessary to take measures to protect firms, customers,

and the industry

Cybersecurity Affects Everyone

Page 5: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Members should have supervisory practices in place reasonably designed to Diligently supervise the risks of unauthorized access or

attack of their IT systems Respond accordingly should unauthorized access or an

attack occur

Regulatory Objective

Page 6: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Interpretive Notice to NFA Compliance Rules 2-9, 2-36 and 2-49 entitled Information Systems Security Programs

Development: Much research and input from:

Members, other regulators, cybersecurity experts NFA Advisory committees

Reviewed and approved by NFA Executive Committee and Board of Directors

Submitted to CFTC in August 2015 Approved by the CFTC in October 2015

Effective March 1, 2016

Background & Development

Page 7: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Requires Member firms to adopt and enforce written policies and procedures to secure customer data and access to their electronic systems tailored to their specific business activities and risk

Background & Development

Page 8: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Differences in type, size and complexity of Members’ businesses No one-size-fits-all solution Appropriate degree of flexibility to determine how to best diligently

supervise information security risks NFA established general requirements relating to Members’

information systems security programs (ISSP) Member firms should adopt and tailor the guidance in NFA’s

interpretive notice to their particular business activities and risks NFA’s policy is not to establish specific technology requirements

Principles-Based Risk Approach

Page 9: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Requires Member firms to adopt and enforce written policies and procedures to secure customer data and access to their electronic systems tailored to their specific business activities and risk

Key areas: Governance Security and risk analysis Deployment of protective measures Response and recovery Employee training Third-party service providers Recordkeeping

ISSP Development

Page 10: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Governance framework supports informed decision making and escalation within the firm to identify and manage security risks

ISSP must be approved within Member firms by an executive-level official

Board engagement as applicable Monitor and review effectiveness of ISSP regularly—at

least once every 12 months—and adjust as appropriate

Governance

Page 11: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Supervisory obligation to assess and prioritize risks associated with the use of IT systems

Maintain an inventory of critical IT hardware with network connectivity, data transmission or storage capability, and critical software

Identify significant internal and external threats and vulnerabilities to at-risk data, including customer and counterparty PII, corporate records and financial information. Steps may include: Utilize network monitoring software Watch for unauthorized users on physical premises Become members of threat/data sharing organizations such as

the Financial Services Information Sharing and Analysis Center (FS-ISAC)

Security and Risk Analysis

Page 12: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Assess threats to and vulnerability of electronic infrastructure and threats posed through third-party services or software

Know the devices connected to the network Estimate the severity of potential threats Perform a vulnerability analysis Decide how to manage the risk of these threats

Security and Risk Analysis

Page 13: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Document and describe the safeguards deployed in light of identified system threats and vulnerabilities

15 safeguard examples outlined in Interpretive Notice, including: Access controls to systems and data Complex passwords Firewall and anti-virus software Software updates and current operating systems Backing up data regularly Encryption Network segmentation Web filtering technology Safeguard mobile devices

Deployment of Protective Measures

Page 14: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Create an incident response plan to provide a framework to: Manage detected security events or incidents Analyze their potential impact Take appropriate measures to contain and mitigate their threat

Consider sharing details of any detected threats to an industry-specific information-sharing platform such as FS-ISAC

Procedures to restore compromised system and data Communicate with appropriate stakeholders and regulators Incorporate lessons learned into the ISSP

Response and Recovery

Page 15: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Description of ongoing education and training for all appropriate personnel

Conducted for employees upon hiring Conducted periodically during employment Appropriate to security risks Members face and

composition of their workforce

Employee Training

Page 16: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Address risks posed by third-party service providers Perform due diligence on critical third-party service

providers’ security practices Consider procedures to allow appropriate access and

terminate access once the provider is no longer providing service

Third-Party Service Providers

Page 17: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Maintain all records relating to: A Member’s adoption and implementation of an ISSP a Member’s compliance with the Cybersecurity

Interpretive Notice

Recordkeeping

Page 18: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Developed to assist firms in meeting their obligations related to ISSPs

Covers key areas of Interpretive Notice Not intended to replace written ISSP Expertise required to develop written ISSP should also be

considered

Self-Exam Questionnaire

Page 19: February 2, 2016 | Chicago NFA Cybersecurity Workshop

NFA Interpretive Notice: http://www.nfa.futures.org/news/PDF/CFTC/InterpNotc_CR2-9_2-36_2-49_InfoSystemsSecurityPrograms_Aug_2015.pdf

NFA Notice to Members: http://www.nfa.futures.org/news/newsNotice.asp?ArticleID=4649

NIST Framework for Improving Critical Infrastructure Cybersecurity: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf

SANS Institute: http://www.sans.org/ FINRA Report on Cybersecurity Practices:

http://www.finra.org/file/report-cybersecurity-practices FS-ISAC: http://www.fsisac.com/

Resources

Page 20: February 2, 2016 | Chicago NFA Cybersecurity Workshop

CYBERSECURITYEXPERT PANEL

Page 21: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Amy McCormick Moderator (NFA)

Patricia Donahue Rosenthal Collins Group LLC

Buddy Doyle Oyster Consulting

Peter Salmon Investment Company Institute

Panelists

Page 22: February 2, 2016 | Chicago NFA Cybersecurity Workshop

WHAT TO EXPECT DURING AN EXAM

Page 23: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Any programs that are adopted will be refined over time Incremental approach Review ISSP for expected components and overall

reasonableness Obtain high-level understanding of the firm’s

preparedness against cybersecurity risks Perform additional work as needed

What to expect during an exam

Page 24: February 2, 2016 | Chicago NFA Cybersecurity Workshop

Contact Us

If you have questions or would like more information, please contact NFA.

Shuna Awong Patricia Cushing212-513-6057 [email protected] [email protected]

Amy McCormick Dale Spoljaric312-781-7438 [email protected] [email protected]