Professional Documents
Culture Documents
As you know customers, governments, and enterprises have become more sensitive than ever about
• Data Privacy - Now’s the Time 4
for the US to Catch Up Personally Identifiable Information (PII) - where it resides, who has access to it, and what is done with
it. As a result, regulatory bodies at all levels of government are making enterprises that keep customer
PII more accountable for securing it and enabling customers to have more control over it.
• A Closer Look at CCPA 7
In most enterprises, the people responsible for successful regulatory audits do not choose or
• The Road to Compliance: 14 implement the data privacy solutions that make it easy and fast to ensure compliance. There is
Steps for Securing Data to often lack of communication and technology gaps that if left unaddressed can become very costly.
Comply with the GDPR We want to help you overcome this challenge.
• 5 Secure Steps to 30 The papers in this tool kit have been included to give you some insight into what enterprises like
NYDFS Compliance yours are facing when it comes to complying with regulations governing data privacy. We provide
in-depth looks at a few high-profile regulations so you may familiarize yourself with the types of
requirements that you have or will have soon. Regardless of your industry, the size of your enterprise,
or the geographic area in which you operate or have customers, data privacy regulations are a concern
and your ability to comply with these regulations is critical to your success or failure as a business.
5 2021 Data Privacy Tool Kit | Data Privacy – Now’s the Time for the US to Catch Up
personal information, and its own reporting requirements and processes. In Since then, the US Senate Committee on Commerce, Science and Transportation
the absence of a consistent federally legislative framework, this piecemeal has held a hearing entitled “Revisiting the Need for Federal Data Privacy
approach is a logistical and regulatory minefield for American businesses. In Legislation”, and both Republicans and Democrats have introduced bills relating
the wake of the Coronavirus pandemic, this kind of administrative burden is to data privacy – the Setting an American Framework to Ensure Data Access,
one of the last things the US economy Transparency, and Accountability (“SAFE DATA”) Act, and the Consumer Online
needs right now. Privacy Rights Act (COPRA), respectively.
But whichever way the vote in Georgia plays out, passing a piece of As we’ve seen from recent activity in the Senate, there is some momentum behind
legislation which sets out clear definitions of personal information, and firm the introduction of the kind of legislation we’ve seen in place elsewhere in the
guidance on its secure and respectful handling, should be toward the top of world. However, we won’t know just how strong that momentum is until the new
the Biden Administration’s to-do list. Fortunately, there are signs of support year. Watch this space. This topic and several other trends that we anticipate
for such legislation from both sides of Government. impacting 2021 are discussed in the “Where Do We Go From Here? 2021 Security
Predictions”. We invite you to listen the fire side chat here.
In July, for example, the bipartisan Cyberspace Solarium Commission
published the draft of its proposed Personal Data Security and Privacy
Protection Act of 2020, which outlines the need to provide consumers with
transparency and access to their data, states requirements for reasonable
security measures, and that considers the importance of international
interoperability.
6 2021 Data Privacy Tool Kit | Data Privacy – Now’s the Time for the US to Catch Up
THE CALIFORNIA CONSUMER PRIVACY ACT
Data monitoring 11
The legislation came into effect on January 1, 2020 Definition of personal information
Data risk analytics/RASP/WAF 12
with regulatory enforcement expected to begin six
Data masking 12 Violation or data breach
months later on July 1.
• Conclusion 13
The CCPA is often compared to Europe’s General Data Protection Act (GDPR) and and store data across multiple environments. Their data security teams can receive
it’s fair to say that organizations that have ramped up to GDPR compliance will tens of thousands of threat alerts daily causing alert fatigue and the risk of a
find it easier to meet the requirements of CCPA. Businesses should not assume, serious threat slipping through the net.
however, that complying with GDPR lets them off the hook. While there are
similarities – for example both regulations give individuals the right to access and
delete their personal information - they are two separate legal frameworks and
that impose different obligations.
The Imperva Data Discovery and Classification solution scans Imperva Data Security solutions provide enterprise-wide visibility
your network and servers to find any unknown databases, into all database activity by monitoring all user database access,
pinpoints and classifies sensitive data using dictionary and on-premises or in the cloud, and retains all the audit logs.
pattern-matching methods, and can scan database content
Using policies that Imperva provides for regulations such as CCPA,
for pre-defined data types such as credit card numbers,
organizations can identify the user by role (including privileged
national identifiers, email addresses, system credentials,
users) or account type (such as a service account), know whether
and more. This helps companies take a risk-based approach
the data accessed was sensitive, and easily detect non-compliant
to their data security by evaluating and prioritizing which
access behaviors. This automates detection of the nature or origin
datasets require which levels of protection to reduce the
of a threat and helps to accelerate any required incident response.
impact of a breach and reduce risk to their organization.
Organizations can create custom policies of their own as needed.
Executive summary
The European Union (EU) General Data Protection Regulation (GDPR) has This guide is for CISOs who want to understand whether their
replaced the Data Protection Directive 95/46/EC (Directive). companies are impacted by the new regulation, how it impacts them,
and what steps their teams can take to comply with GDPR data
The regulation expands privacy protections and includes obligations for
security requirements. You’ll learn:
companies that handle personal data originating in the EU. Unlike the
Directive, it extends the reach of the data protection law to companies who • The basic framework, intent, and extent of the GDPR
may have no presence in the EU as long as those companies • Which companies are affected
process an EU resident’s personal data in connection with goods or services
• What the penalties are for non-compliance
being offered or if those companies monitor the behavior of individuals within
• A pragmatic approach to approaching a GDPR compliance project
the EU.
• How Imperva can help
Even for organizations that already follow cybersecurity best practices,
GDPR data security requirements could result in process and technology
changes that will require substantial time and resources to implement. The
potential upside for security teams is twofold: they may benefit from the
increased investigative capacity and streamlined breach response plan that
comes with process and technology measures as a result of compliance.
15 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
For companies located in the EU, doing or seeking to do business with SOURCE: CAP GEMINI SURVEY - SEPT 2019
individuals in the EU, or monitoring the behavior of or collecting information
from individuals in the EU, the GDPR has introduced a new level of
compliance obligations around privacy and data security.
Wherever your company is on the road to GDPR compliance, this guide can
help you take the right steps to get there.
16 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
Both data controllers (those that determine the purposes and means
of processing personal data) and data processors (those that process
personal data on behalf of the controller) of personal data originating in
the EU or of EU residents, regardless of the location of the business.
17 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
GDPR requirements apply to any organization doing business in the EU • The use of a language or a currency generally used in one or more EU
regardless of whether the processing of personal data takes place in the EU Member States with the possibility of ordering goods and services in
or not, and whether it’s data about EU residents or EU visitors. that language
It is important to note that the new rules will apply to businesses established • The mentioning of customers or users who are in the EU1
outside the EU if they process the personal data of EU residents or visitors in
connection with:
1
Paragraph 23 of the Introductory Recitals to the GDPR.
18 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
Example 1
A financial analyst firm is tasked with projecting a European company’s
revenues for the next three years. The primary analyst works out of an office
in the US, but uses personal data provided by the client. Because the data
was collected in the EU, it is subject to GDPR requirements, even though the
analyst is based out of the US office and didn’t originally collect the data.
Example 2
A mobile and online website allows people to shop for, buy, and rate
products. The US-based company that owns the retail storefront collects
personal data about the people that visit and make purchases. The
information is subsequently used in advertising campaigns and sales reports.
If a person visits the website while they are physically present in the EU, the
requirements of the GDPR follow the personal data collected during that
visit. That means that any website or mobile application that is accessible by
and collects personal data from a person in the EU will need to comply with
the GDPR.
1
Paragraph 23 of the Introductory Recitals to the GDPR.
19 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
2
Official Journal of the European Union, Regulation (EU) 2016/679 of the European Parliament and of the Council.
20 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
EU regulators (i.e., the relevant data protection authority) have the power to
levy a fine of €800 million/$862 million (4% of €20 billion), which is far more
than the €20 million minimum. With typical operating margins in single digits,
a fine of this magnitude could easily consume most of the profit for a large
company for an entire year.
Annual Revenue
€20 billion/~$21.5 billion
21 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
Data privacy impact A DPIA helps identify and minimize privacy risks.
assessment (DPIA) Working with stakeholders within the business and
partner organizations, you document how personal data Credit card
Merchant Services
processing complies with the GDPR. A DPIA is required
by the GDPR in high-risk situations.
Data flow analysis Identify all systems which touch data that is within the
Information Information
scope of the GDPR. Map the flows of data from point of Access/ Archive/
Transfer Destruction
entry all the way through to destruction, including third-
party processes. Data mapping helps you ensure that Filfilment
Vendor
Disaster Recover
& Backups
all risks are uncovered appropriately as you gain a solid
understanding of your organization’s complete data life Combined Data Transaction Data Cookies
cycle. See Figure 1. Financial Data Customer Data (non-financial)
22 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
Risk assessment(s) Follow the touch points for the data (including The GDPR requires public authorities processing
databases, file systems, and people) and perform a risk personal information to appoint a data protection
assessment against each of them. You’ll be evaluating officer (DPO) when core activities require “regular
current data protection policies and processes as well as and systematic monitoring of data subjects on a
the technology controls that enforce those policies and large scale” or consist of “processing special
procedures. For example, do you have controls in place categories of data” on a large scale or if required
to enforce cross-border data transfer requirements of to do so by local law.
the GDPR? Identify areas of higher risk and what needs
to happen to mitigate that risk. As written in the GDPR, the DPO’s tasks include:
informing and advising on compliance obligations,
monitoring compliance, advising with regard to
Evaluate your procedures and controls to detect, report data protection impact assessments, working
Data breach
procedures review and investigate a data breach. The GDPR imposes and cooperating with the designated supervisory
breach notification requirements for data controllers and authority, and being available for inquiries from
processors. For example, data controllers must report data subjects.
data breaches to supervisory authorities within 72 hours According to a study by the International Association
of becoming aware of a breach unless the breach is of Privacy Professionals (IAPP), in Europe alone,
unlikely to result in a risk to the rights and freedoms of a 28,000 DPOs were expected to have been appointed
natural person. by May 25, 2018.
Source: Rita Heimes and Sam Pfeifle, “Study: At least 28,000 DPOs needed to
Identification Identify how you’ll remediate any compliance gaps meet GDPR requirements,” International Association of Privacy Professionals,
April 19, 2016.
of gaps and detected in your risk assessments. Prioritize which
remediation plans gaps are higher risk and should be addressed first.
Remediation plans can include: training or hiring
staff, process or policy changes, legal contracts, and
implementing new technology controls.
23 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
Sign off on Present the results of your analysis along with the
outcomes recommended solutions to get support and budget for
(benefits) the project. You should get executive sign off on the
expected outcomes of the project.
24 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
The GDPR requires organizations practice data Breach Detection and Incident Response:
Imperva Data Security minimization, which means they collect and In the event of a personal data breach, the GDPR
Imperva Data Security protects sensitive data from use data limited to only what is necessary for a dictates that data controllers must notify the
potential data breaches and can help you implement specific purpose. Imperva Data Security includes supervisory authority “without undue delay and,
adequate data safeguards, which Data masking capability that replaces real data where feasible, not later than 72 hours after having
are a core component of GDPR compliance. Imperva with realistic fictional data that is functionally and become aware of it.” Imperva utilizes machine
Data Security includes: statistically accurate. It facilitates processing of learning and data risk analytics to pinpoint and
personal data beyond original collection purposes prioritize high-risk incidents, filtering out the noise
and also limits the spread of personal data beyond and allowing security team to accelerate threat
“need-to-know”. investigation and response.
25 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
Professional Services
In addition to Imperva Data Security, Imperva Imperva Project Discovery and Analysis Service:
provides professional services to help organizations
Imperva Project Discovery and Analysis (pDnA)
accelerate GDPR:
service evaluates current database security controls
to identify control gaps. Key deliverables include:
Imperva Data Discovery and Analysis Service: identification of key stakeholders, risk assessment,
and recommendations of solutions and plans to
Imperva Data Discovery and Analysis Service:
address identified gaps.
Imperva Database Discovery and Analysis (dDnA)
service provides a proven methodology to discover
and classify data, which is a critical aspect of
GDPR compliance. Key deliverables include:
identification of database assets, data owners and
data custodians; risk classification of data; and
control recommendations.
26 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
25: Data protection by Implement technical and organizational measures • Data minimization
design and by default to show consideration and implementation of Data • User access limits
Protection Principles and appropriate safeguards
• Limit period of storage and accessibility
32: Security of processing Implement appropriate technical and organizational • Pseudonymization and encryption
security controls to protect personal data against • Ongoing protection
accidental or unlawful loss, destruction, alteration,
access or disclosure • Regular testing and verification
33 and 34: Data breach 72 hour notification to Data Protection Authority fol- Breach report that includes:
notification lowing discovery of data breach, and notification • what happened
to affected individuals
• numbers of affected individual
• what data was breached
35: Data protection impact Assessment of the purpose, scope and risk Inventory of personal data across organization, access
assessment associated with processing personal data rights to data, and risk associated with that access
44: Data transfers to third Permit transfers only to entities in compliance with Monitor and block access to entities or regions that do
country or international GDPR regulation not meet requirements
organization
27 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
01 02 03 04 05 06 07
EXECUTIVE INTRODUCTION ABOUT THE GDPR DOES GDPR APPLY TO THE PRICE OF A CHECKLIST FOR IMPERVA CAN HELP
SUMMARY YOUR ORGANIZATION? NON-COMPLIANCE APPROACHING GDPR
About Imperva
Learn more
Recognized by industry analysts as a cybersecurity
leader, Imperva champions the fight to secure data and
Find out more about how to comply with the data applications wherever they reside. In today’s fast moving
protection regulations within GDPR:
cybersecurity landscape, your assets require continuous
protection, but analyzing every emerging threat taxes
• Read the full text of the General Data Protection
Regulation (GDPR) your time and resources. For security to work, it has to
work for you. By accurately detecting and effectively
• Check out the white paper GDPR: New Data
blocking incoming threats, we empower you to manage
Protection Rules in the EU
critical risks, so you never have to choose between
• Learn more about Five Ways Imperva Helps You innovating for your customers and protecting what
with GDPR Compliance matters most.
28 2021 Data Privacy Tool Kit | The Road to Compliance: Steps for Securing Data to Comply with the GDPR
Imperva is an analyst-recognized,
cybersecurity leader championing the
fight to secure data and applications
wherever they reside.
imperva.com
Copyright © 2021 Imperva. All rights reserved +1.866.926.4678
A SECURITY PROFESSIONAL’S GUIDE TO
THE NYDFS CYBERSECURITY REGULATION
5 Secure Steps to
NYDFS Compliance
Executive summary
Financial firms face many challenges today, not least the growing number
On March 1, 2017, the New York State Department of Financial Services1
of cyberattacks. This e-book looks more closely at these challenges and
(NYDFS) introduced new cybersecurity regulations for financial services to
explores the benefits of adopting a risk-based approach to security as
protect their customers’ data and to maintain security of operations within
encouraged by NYDFS.2 It also outlines how Imperva solutions can help
the industry.
you comply with specific elements of the regulation.
The regulation, formally known as 23 NYCRR 500, but referred to as
NYDFS, provides financial firms with a structure on which to build
cybersecurity programs and policies specific to their business models to
protect systems and consumers from the increased threat of cyberattacks.
The comprehensive nature of the NYDFS means that even firms with
existing security programs and procedures in place will benefit from
implementing and maintaining the processes required by the regulation.
1
The NYDFS regulates approximately 1,500 financial institutions and banks as well as over 1,400 insurance companies.
2
The NYDFS regulation encourages adopting a risk-based approach to cybersecurity. It was revised after considering feedback received during a 45 day comment period on the original proposal issued September 13, 2016.
Consequences of noncompliance
NYDFS has not outlined any specific information on consequences
NON-COMPLIANCE / TIME ALLOWED TO
regarding penalties for noncompliance with the cybersecurity regulation REGULATION
VIOLATION OF REGULATION REPORT INCIDENTS
other than including a requirement to notify the superintendent of a breach
“as promptly as possible but in no event later than 72 hours”3 after a breach Up to (a) $2,500 per day during which a vi-
has occurred. However, given the severity of penalties imposed under olation continues, (b) $15,000 per day in the
event of any reckless or unsound practice
similar global regulations and considering penalties outlined in the New NYDFS 72 hours
or pattern of misconduct, or (c) $75,000
York Banking Law,4 the penalties could be severe. See the table below: per day in the event of a knowing and willful
violation (if New York Banking Law applied)
Up to 20 million euros or up to 4 % of a
GDPR company’s total global turnover of the pre- 72 hours
ceding fiscal year, whichever is higher
IT incidents
and systems
malfunctions within 60
Reputational Damage and Revocation
MAS-TRM mins. Incident
of License
report to be
submitted within
14 days
3
https://www.dfs.ny.gov/docs/legal/regulations/adoptions/dfsrf500txt.pdf
4
https://www.nysenate.gov/legislation/laws/BNK/44
Market challenges
Maintaining normal business operations in today’s rapidly changing market
is a constant challenge for financial firms who find themselves balancing
Pressures in financial services industry
performance, compliance, and security to remain ahead of the game. Risk mitigation, transformation, compliance
Digital transformation
The pressure is mounting to innovate with fintech start-ups developing the
latest digital apps and solutions at a fast pace, and tech giants getting in Complex legacy system
on the act by offering their own range of financial products to their loyal Innovative Risk Digital application
Compliance
Mitigation
customer bases. A lack of skilled security professionals is also hindering Fintech models Cloud adoption
Big Tech
firms from keeping up with digital transformation and the move to cloud More data, everywhere
Open Banking
computing. Increased competition
Transformation
Stricter regulations
The financial sector remains a prime target for cybercriminals because of the
high value of the rewards to be gained.
5
https://www.forbes.com/sites/bhaktimirchandani/2018/08/28/laughing-all-the-way-to-the-bank-cybercriminals-targeting-us-financial-institutions/#39691b716e90
With DDoS and social engineering attacks on the increase, it only takes Compliance
one bad actor to make its way into your network for a breach to occur.
In parallel, financial firms must comply with more complex regulations to
Financial institutions were once considered bastions of security, prevent large enforcement fines, reputational damage, and intervention by
protecting their valuable assets, including vast amounts of critical and the regulators.
sensitive data, by storing it within the secure confines of their data centers.
Since the European General Data Protection Regulation was introduced
Perimeter lines were clear, with the only people having access to the data
in 2018, the matter of data privacy has come under the spotlight for all
being employees, using company-owned computers located on business
industries across the globe and, as a result, firms are much more cautious
premises.
about protecting data that is of a personally identifiable nature (PII)
In contrast, today’s use of cloud technologies means users are connecting and are looking for ways to simplify and automate their regulatory
to networks remotely using multiple devices, and data is stored across compliance processes.
hybrid hosting environments as firms rely on legacy systems while
they transition to the cloud. As a result of all these changes, data is
experiencing exponential growth, and while more data brings business
benefits and opportunities, it also poses real challenges for the industry.
With the advancing data sprawl, the once-clear security perimeter lines
have become blurred and the threat surface has expanded. Security
teams are struggling to cope with the sheer volumes of data and the
subsequent numbers of threat alerts received daily. According to the
CyberEdge Group’s 2019 Cyberthreat Defense Report,6 the biggest
inhibitor to establishing effective cyber threat defenses for security teams
is having too much data to analyze.
6
https://www.imperva.com/resources/reports/CyberEdge-2019-CDR-Report-v1.1.pdf
Risk mitigation
Digital transformation and compliance are major drivers of change for financial “In times of transformation, it is
services and change brings risk as organizations adapt to new processes critical to pay attention to opera-
and workflows and growing volumes of data increase the threat landscape. tional risk - the risk of loss due to
However, the pace at which firms are adjusting their security posture is
errors, breaches, loss or damage.”
disproportionate to the speed at which the attack surface is expanding.
BAIN & COMPANY REPORT, 2018 7
There are several ways that firms can mitigate change-driven risks including
having a robust governance framework in place, regularly monitoring the risks,
and consistently risk-assessing the changes.
7
https://www.bain.com/insights/how-banks-can-manage-operational-risk/
54%
The most effective way to buy-down risk for your organization is to of companies admitted that they
secure the data itself and to take a unified approach using both edge and data tend to ignore security alerts.
security to give you the defense-in-depth you need to fully protect your assets.
8
Gartner - Develop a Financial Risk Assessment for Data Using Infonomics - Published 30 January 2019
9
The Federal Trade Commission (FTC) has brought legal actions against organizations that have violated consumers’ privacy rights, or misled them by failing to maintain security for sensitive consumer information, or caused substantial consumer injury.
Companies can address this problem and reduce monitoring scope for
their security teams through implementing security measures such as data
masking and data risk analytics.
Data risk analytics uses machine learning to identify the most critical
threats by uncovering suspicious data access behaviors that could put
your enterprise data at risk. It also applies grouping and scoring algorithms
for each incident and, as a result, only a few high-risk incidents bubble up
to the surface making user access much easier to manage.
Conclusion
The final NYDFS regulation issued in 2017 was a revised version based
on feedback from industry consultation. One of the biggest concerns
was that a ‘one-size-fits-all approach was not suitable for an industry
with firms with such diverse risk-profiles. The outcome was that NYDFS
adjusted and reissued the 23 NYCRR 500 regulation in 2017 to allow firms
to take a risk-based approach to compliance.
34%
all database activity, including local privileged user access and service of workers said they share
accounts, in real time. passwords of accounts
with their coworders.
5. Incident Response
In the event of a breach, the NYDFS dictates that “the entity shall
notify the superintendent as promptly as possible but in no event
later than 72 hours from a determination that a cybersecurity event
has occurred.” Imperva utilizes machine learning and data risk
analytics to pinpoint and prioritize high-risk incidents, filtering out the
noise and allowing security teams to accelerate threat investigation
and response. Reducing the influx of threat alerts received speeds up
the threat investigation process by improving visibility of the alerts
that matter. Data risk analytics also helps mitigate the risk of an attack
on the inside.
Additional resources
More information
• https://www.dfs.ny.gov/docs/legal/regulations/adoptions/dfsrf500txt.pdf
• https://blog.focal-point.com/understanding-the-4-phases-of-the-nydfs-
cybersecurity-regulation-23-nycrr-500
• https://www.forbes.com/sites/zakdoffman/2019/04/29/new-cyber-report-25-
of-all-malware-hits-financial-services-card-fraud-up-200/#6bae3bdd7a47
• https://www.psdgroup.com/workshop-operational-risk-assessment-of-
change/
About Imperva
Recognized by industry analysts as a cybersecurity leader, Imperva champions
the fight to secure data and applications wherever they reside. In today’s fast-
moving cybersecurity landscape, your assets require continuous protection, but
analyzing every emerging threat taxes your time and resources. For security to
work, it has to work for you. By accurately detecting and effectively blocking
incoming threats, we empower you to manage critical risks, so you never have
to choose between innovating for your customers and protecting what matters
most. At Imperva, we tirelessly defend your business as it grows, giving you
clarity for today and confidence for tomorrow. Imperva – Protect the pulse of
your business.
imperva.com
Copyright © 2021 Imperva. All rights reserved +1.866.926.4678