Cyber New Year’s Resolution: Start with a Gut Check
Ever get that feeling that you don’t know what you don’t know about the effectiveness of your cybersecurity program?
On October 27, 2021, the FTC published revisions to Part 314: The Standards for Safeguarding Customer Information. It outlines a set of requirements that “financial institutions” must adhere to in order to protect sensitive customer information. It basically includes a deadline of 1 year, or October 27, 2022 for compliance - and we all know that date will be here quickly.
The good news: if you are a bank or federally insured credit union, you can sit this one out. While we expect cyber regulations and guidance to continue to grow and become more prescriptive in the coming years in ALL industries, the new requirements do not affect banks or NCUA-insured credit unions.
The bad news: if your business is defined by the FTC’s new rules as a “financial institution” (read on for that list), then you need to become very familiar with the material outlined in this blog post as it will change (or maybe establish) how you MUST manage cybersecurity going forward.
The FTC defines a “financial institution” as:
The Rule basically says that these businesses must develop and maintain a risk-based information security program (ISP) with administrative, technical, and physical controls to appropriately protect customer information. (Just some good ole’ fashioned information security there, folks!)
It goes on to spell out, in great detail, how that will be done. I’ll try to cover those items as concisely as possible in this post.
BTW - I think what the FTC is doing here is removing room for interpretation as much as they can. I’m sure they’ve heard businesses argue that they didn’t need such-and-such control because they did a risk assessment (in their head, mind you) and found it to be unnecessary. It feels like they are tired of that game and are making this more black-and-white. There was a TON of pushback on this new rule, but I feel it’s for good reason: sometimes people only take things seriously when it’s a law. Unfortunately, cybersecurity happens to be one of those things for MANY people and businesses.
In order to develop, implement, and maintain an information security program, the rule requires that “financial institutions”:
I know - that’s a lot. If done properly, it has all the makings of a real-deal information security program. But it will be extremely difficult and very time-consuming for someone that doesn’t have experience building and maintaining an ISP. AND you only have 10 months to implement all the requirements.
My recommendation is to start by identifying your Qualified Individual or a Virtual Qualified Individual and have them implement these pieces in cooperation with your IT staff or IT provider. Don’t do it the other way around. Most IT staff and IT providers are not experienced in building and maintaining this type of program and you’ll be doing a lot of rework. Look for firms that specialize in virtual ISO, virtual CISO, or CISO-as-a-service offerings in highly regulated industries, such as banking.
If you have any questions on building a program like this, or would like to learn more about how a virtual CISO can fulfill your “Qualified Individual” requirements, drop us a note at support@bedelsecurity.com.
Ever get that feeling that you don’t know what you don’t know about the effectiveness of your cybersecurity program?
Show of hands: how many people wish they could comment on Congressional bills and/or speak directly to the lawmakers responsible? Unfortunately, the...
Several weeks ago, I was out with the rest of the Bedel Security staff on a strategic and team building exercise. During our meal we discovered a...