FFIEC Authentication Guidance , Governance & Risk Management , Incident & Breach Response

Should Banks Expect New Cybersecurity Guidance?

Experts Say FDIC Publication Suggests No Formal Action Coming
Should Banks Expect New Cybersecurity Guidance?

How will federal banking regulators respond to growing criticism of the Cybersecurity Assessment Tool issued by the Federal Financial Institutions Examination Council?

See Also: Webinar | Identity Crisis: How to Combat Session Hijacking and Credential Theft with MDR

There is no formal response yet, but the Federal Deposit Insurance Corp. has issued a new publication that leads some banking and security experts to believe no new guidance is forthcoming.

In its winter edition of Supervisory Insights, the FDIC's Division of Risk Management Supervision provides a synopsis of cybersecurity guidance, tools and best practices - all of which is meant to hammer home the point that regulatory examiners will continue to scrutinize whether banking institutions are carrying out these recommendations.

Al Pascual, head of fraud and security at Javelin Strategy & Research, is among those predicting that, based on the issuance of the synopsis, no new guidance is on the way. Instead, examiners likely will continue to use the FFIEC's Cybersecurity Assessment Tool, even though its use is supposedly voluntary.

"They cite a wealth of information and resources available to FIs [financial institutions] for managing cyber risk," he says. "It would seem to me, in keeping with sound regulatory practice, that the FDIC would not further raise the compliance burden of FIs, especially on such a fast-moving topic, if there is timely information elsewhere that they are implicitly standing behind."

Amy McHugh, an attorney and former IT examination analyst with the FDIC who now works as a banking consultant for CliftonLarsonAllen, notes: "This is an interim response to the issues raised recently by the industry about the lack of guidance. Instead of providing additional guidance, they just summarized previous information."

Criticisms of Cyber Assessment Tool

In recent weeks, bankers have been critical of examiners' use of the FFIEC's Cybersecurity Assessment Tool because its use is supposed to be voluntary (see Banks to FFIEC: Cyber Tool is Flawed).

But McHugh says it's likely the tool will continue to be used during the examination process, even though this most recent edition of the FDIC's Supervisory Insights suggests banks should rely more heavily on the National Institute of Standards and Technology Cybersecurity Framework.

"Use of the [NIST] cybersecurity framework is not intended to replace a bank's traditional information security program, but rather modify the program to address emerging cyber risks," according to the article, which is credited to Michael B. Benardo and Kathryn M. Weatherby of the Cyber Fraud and Financial Crimes Section of the FDIC's Division of Risk Management Supervision. "A bank's information security program should evolve as the operating environment and the threat landscape change. An effective information security program is not static and should be regularly evaluated and updated."

Bank management must incorporate the cybersecurity principles noted in the NIST framework into the bank's overall risk-management framework, the authors note in their synopsis.

McHugh contends, however, that while using the NIST framework as a guidepost for security makes sense, most of the regulatory examiners that are currently evaluating the cybersecurity soundness of banking institutions are less familiar with than they are the Cybersecurity Assessment Tool.

"The CAT [Cybersecurity Assessment Tool] will continue to be a discussion point in exams for 2016," she says. "If they have the time, I would recommend FIs [financial institutions] begin familiarizing themselves with the NIST framework but focus on the CAT for this year."

Matt Neely, director of strategic initiatives and management consulting at financial consultancy and compliance firm SecureState, says regulators' mention of the Cybersecurity Assessment Tool "continues to show the importance of this tool."

"More so, it further hints to the fact that this tool is more mandatory than optional," he adds. "We have seen more regulators using this tool during their audits, which in the past hasn't been regarded as requirement."

The FDIC's Division of Risk Management Supervision's release of the synopsis suggests that banking regulators want to make sure existing guidelines, tools and best practices are being applied, Neely says. "For example, we are seeing that more of our clients are needing to do more in-depth security testing on their Web and mobile applications, because past testing was deemed as failing to meet requirements," he says.

12 Regulatory Actions, Resources of Note

The FDIC synopsis points to 12 key regulatory actions and resources:

Cybersecurity attorney Chris Pierson, who also serves as CISO of payments and invoicing provider Viewpost, says the FDIC wants to reiterate that cybersecurity controls and governance are top priorities.

"It seems less likely that wholly new guidance will be out, but, rather, that the FDIC and other prudent regulators (e.g., the Federal Reserve, OCC) are communicating that all the guidance is available, and for banks to take action on these risks and controls."


About the Author

Tracy Kitten

Tracy Kitten

Former Director of Global Events Content and Executive Editor, BankInfoSecurity & CUInfoSecurity

Kitten was director of global events content and an executive editor at ISMG. A veteran journalist with more than 20 years of experience, she covered the financial sector for over 10 years. Before joining Information Security Media Group in 2010, she covered the financial self-service industry as the senior editor of ATMmarketplace, part of Networld Media. Kitten has been a regular speaker at domestic and international conferences, and was the keynote at ATMIA's U.S. and Canadian conferences in 2009. She has been quoted by CNN.com, ABC News, Bankrate.com and MSN Money.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.