February 19, 2019 | Written by: Amelia Ross
Categorized: Banking | Client Stories | Security
Share this post:
Gary Meshell, WW Leader Financial Services, IBM Security, opened his IBM Think 2019 talk, How Financial Services Companies Should Respond to Cyber Security Attacks with a bold assertion and truism. “It’s not a matter of if you will be breached, but just a matter of when,” he said.
Financial services firms must do more than just plan to prevent a data breach but knowing they will get breached, prepare to respond. “If you think you’re prepared for a cybersecurity attack, you’re not,” Meshell continued.
Meshell was joined on stage by Sean McKee, Senior Manager, Cyber Threat Management, TD Bank, to provide a perspective on how to ensure that a financial services company can gauge its readiness for a cyber security attack. IBM and TD Bank jointly developed cyber security incident response solution for the financial services industry.
The discussion touched on how financial services firms face a long list of complex and potentially interrelated risk factors:
- Phishing attacks
- Cyber fraud – including executive digital impersonation
- Insider risk
- Supply chain risk
McKee told the audience of 70 financial services executives that, “From a macro, geopolitical stand point, if a nation state were able to disrupt through a cyberattack another nation’s infrastructure, we are wholly dependent on energy to run financial services.”
Sean McKee, Senior Manager, Cyber Threat Management, TD Bank
An increasing number of attacks on payment systems are using phishing attacks and social engineering to find out which employees have access to payment systems. The attackers use those employees for system breaches on payment systems. “People are your weakest link regardless of the controls you have,” McKee acknowledged.
Attendees learned that TD Bank is taking down 12 LinkedIn profiles of their CEO a month, all fake, to mitigate employees linking to those accounts and becoming targets of spear fishing.
What steps should a bank take?
- Focus on cyber resiliency. Attacks will happen when you least expect it and are least prepared.
- Have a plan. An incidence response playbook and protocols are guides to managing a crisis on a consistent and coordinated basis.
- Apply a business lens. Craft a strategic and tactical response that goes beyond a technology solution, understanding the customer, corporate and regulatory ramifications.
- Know when to contact ecosystem partners and law enforcement.
The biggest challenges
One of the biggest challenges is the talent gap to respond and sustain response to attacks. Other challenges include:
- Attacker/defender asymmetry—financial services firms are always playing defense
- Legal privilege—the legal team is a stakeholder. Legal privilege concerns what you can and cannot share internally and externally
- Coordinating response with critical 3rd
- Reliance on a common supplier—for example, using the same vendor for additional digital forensics to identify the root cause in a systemic attack.
“Cyber security is as much a business problem as a technology one. Every employee is a cybersecurity manager.” Sean McKee, Senior Manager, Cyber Threat Management, TD Bank
“What can an organization do to prepare?,” McKee asked the audience. “Your plan is not worth the paper it’s written on if nobody knows how to use it,” he continued. He outlined four key steps to effective implementation:
- Exercise and test your strategy and plan. Come to a cyber range and bring your playbook
- Technical security controls testing (ethical hacking committee)
- Resource for success. It takes a long time to produce a proper exercise
- Continuous improvement
“TD Bank did a five month workup for a two day test. The president of the US bank immediately saw the results of their decisions,” McKee told the audience. “Cyber security is as much a business problem as a technology one. Every employee is a cybersecurity manager.”
Meshell wrapped up the presentation saying, “Every six weeks there is an IBM cybersecurity response exercise for senior executives to drive awareness. If you are a regulated industry, you have a fiduciary responsible to protect your customer data.”
–>Learn more about the IBM Cyber Range