5 WSECU Cyber Security Journey for Filene Conf 1-26
Transcription
5 WSECU Cyber Security Journey for Filene Conf 1-26
WSECU Cyber Security Journey David Luchtel VP – IT Infrastructure & Opera:ons Objec:ve of Presenta:on • Share WSECU’s journey • Overview of WSECU’s Security Program approach • Overview of WSECU’s self-‐assessment on the new NCUA Cybersecurity Assessment Tool (CAT) About WSECU • • • • 2nd Largest Washington state based Credit Union 233,000 members and $2.4B assets 550 employees and 20 branches Roots in Public Services – Original charter: Washington state public employees Agenda • • • • WSECU Journey Influencers to our journey WSECU’s Security Program CAT self assessment Our Journey Our Journey Me Too Era (>2014) • Goal: Be as good as our Peers • Benchmark: Pass our audits • Feedback loop: What are our peers doing Security is a Top Priority Era (2015+) • Goal: Protect member confiden:al data is a top priority • Benchmark: Follow security industry best prac:ces • Feedback loop: Test ourselves like hackers do Influencers to our Journey • The world changed • Regulators are reac:ng to the changing world • Added exper:se • Number of breaches over :me • Number of Banking breaches over :me • Number of Payment breaches over :me The World Has Changed Based on 2014 Verizon Data Breach report Aeacker Tac:cs Changed • Targeted • Sophis:cated How are our Regulators Changing? • Responding to public concern • Becoming more targeted and sophis:cated • Developed a new cyber security technical security audit star:ng in 2H2016 – Cybersecurity Assessment Tool (CAT) Added Exper:se • David joined WSECU in 2013 • Sr. Security Engineer in 2014 • Sr. Security Analyst in 2015 WSECU Security Program Framework INPUTS Regulatory Program Performance ERM Industry Administra:ve Awareness Technical Member Informa:on Compliance Controls Training Controls OUTPUTS Roadmap Architecture Assessments Policies Incident Plans Governance Framework Responsibili:es: – – Regulatory compliance Voice of the member Responsibili:es: – Strategic decisions – Security Tone – Alignment to business – Monitor performance Board and Supervisory Commieee Info Security Governance Commieee Security Program WSECU Security Roadmap Priority Broad Focus Area 2013 2015 2016 Vulnerabiltiy mgmt HIGH Malware mgmt Monitoring/analysis Security Training Incident Mgmt MEDIUM Identity mgmt Application security Data security Security perimeter LOW Security governance Security architecture Evaluate New Threats 2017 2019 We Test Ourselves • Internally: – Scan our environment monthly – Scan web apps before produc:on – Test our controls – Grade the effec:veness of our controls – End user tes:ng and learning program • Hire external experts to test us – Social engineering test – Aeempt to hack our systems • Self-‐assess to the NCUA Cybersecurity Assessment Tool (CAT) NCUA Cybersecurity Assessment Tool (CAT) • FFIEC goal – “repeatable and measureable process to inform management of their ins:tu:on’s risk and cybersecurity preparedness” • Published July 2015 and will be used by NCUA auditors star:ng 3Q2016 – All agencies of the FFIEC are adop:ng the tool • NCUA has stated use of the Assessment Tool is not mandatory by FIs. – Auditors will be using it for guidance and consistency. Overview of Assessment Tool • Two parts to tool: 1) Inherent Risk Profile • 5 categories, 39 risk aeributes to assess 2) Cybersecurity Maturity • 5 domains, 493 assessment ques:ons • Your Inherent Risk Profile determines your desired maturity level WSECU Inherent Risk Inherent Risk Profile (by Category) 1. Technologies and Connection Types 2. Delivery Channels 3. Online/Mobile Products and Technology Services Inherent Risk Level Minimal Moderate Least 4. Organizational Characteristics Minimal 5. External Threats Minimal Composite - Inherent Risk Results Minimal WSECU Inherent Risk Domain Maturity Domain 1: Cyber Risk Management & Oversight 2: Threat Intelligence & Collaboration Assessment Factor 1: Governance Sub-Baseline 2: Risk Management Baseline 3: Resources Advanced 4: Training & Culture Baseline 1: Threat Intelligence Evolving 2: Monitoring & Analyzing Evolving 3: Information Sharing WSECU 2019 1: Preventative Controls 3: Cybersecurity 2: Detective Controls Controls 3: Corrective Controls 4: External Dependency Management Current Maturity 1: Connections 2: Relationship Management WSECU 2019 Intermediate Intermediate Advanced Sub-Baseline Sub-Baseline Intermediate Intermediate Sub-Baseline Evolving Sub-Baseline 5: Cyber Incident 1: Incident Resilience Planning & Strategy Baseline Management & 2: Detection, Response, and Mitigation Sub-Baseline Resilience 3: Escalation and Reporting Intermediate Intermediate CAT Self-‐Assessment Observa:ons • How will CAT be used by the examiners? • Did we interpret the ~500 ques:ons the same as examiner? • CAT is very detailed and prescrip:ve to “what” we should be doing • Gepng consensus we meet the “what” • This increases risk of more technical examiners being prescrip:ve in “how” our controls meet the requirements • Need to meet all requirements to be at Maturity level • Board oversight of the Security Program • Baseline maturity vs announcement memo CAT Self-‐Assessment Lessons Learned • Ra:ng scale is based on FI industry, not CU • No guidance on sepng Maturity level based on Inherent Risk • Will the examiners agree with the domain maturity levels we set? • Some maturity categories have a higher bar for baseline than we expected • How will CAT influence or direct your Security Program Learnings from our Journey • Have a collabora:ve approach to security focused on the business • Have dedicated staff focused on security • Use industry best prac:ce frameworks to organize your program • Don’t assume, test yourself • Be prepared to respond