<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jean-Jacob Dreyfus, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/jean-jacob-dreyfus/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/author/jean-jacob-dreyfus/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 02 Jan 2020 10:38:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Jean-Jacob Dreyfus, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/author/jean-jacob-dreyfus/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NIST and FSSCC Team Up for Financial Services Cybersecurity</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/08/nist-fsscc-team-up/</link>
		
		<dc:creator><![CDATA[Jean-Jacob Dreyfus]]></dc:creator>
		<pubDate>Thu, 02 Aug 2018 16:07:22 +0000</pubDate>
				<category><![CDATA[Cyber for Financial Services]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[financial services cyber]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11151/</guid>

					<description><![CDATA[<p>The NIST Cybersecurity Framework (CSF) is widely recognized as a landmark in the evolution of the cybersecurity industry. Given the rapidly-changing cybersecurity landscape, it is vital to keep up-to-date with new developments. To this effect, NIST recently released the long-awaited...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/nist-fsscc-team-up/">NIST and FSSCC Team Up for Financial Services Cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The NIST Cybersecurity Framework (CSF) is widely recognized as a landmark in the evolution of the cybersecurity industry. Given the rapidly-changing cybersecurity landscape, it is vital to keep up-to-date with new developments. To this effect, NIST recently released the long-awaited version 1.1. However, more needs to be done.</p>
<p>In response to industry feedback, including Wavestone’s continuous involvement in the framework development (see our most recent contributions <a href="https://www.nist.gov/sites/default/files/documents/2018/01/31/2018-01-19_-_wavestone.pdf" target="_blank" rel="nofollow noopener noreferrer">here</a> and <a href="https://www.nist.gov/sites/default/files/documents/2017/04/21/2017-04-10_-_wavestone.pdf" target="_blank" rel="nofollow noopener noreferrer">here</a>), NIST is now working hard to allow the guidelines to more easily apply to organizations, thanks to sector-specific “Profiles” (e.g., <a href="https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8183.pdf" target="_blank" rel="nofollow noopener noreferrer">Manufacturing Profile</a> released in September 2017).</p>
<p>The Financial Services Sector Coordinating Council (FSSCC) recently held a workshop hosted by NIST in Washington, D.C., to further develop the Financial Services Profile of the framework. It gathered not only industry members but also regulators such as the FED and the OCC. While it is still preliminary, here are few takeaways…</p>
<p>&nbsp;</p>
<h2><strong>A new risk-tiering methodology</strong></h2>
<p>First and foremost, the profile introduces the concept of risk tiering similar to that of the FFIEC <a href="https://www.ffiec.gov/cyberassessmenttool.htm" target="_blank" rel="nofollow noopener noreferrer">Cybersecurity Assessment Tool</a> (CAT), but with qualitative rather than quantitative criteria. It proposes thirteen questions to determine the organization’s criticality level from 1 (Critical) to 4 (Relevant) based on criteria such as systemic importance, as well as geographical and geopolitical considerations. This criticality level then determines applicable “diagnostic statements” to assess.</p>
<p>&nbsp;</p>
<figure id="post-11152 media-11152" class="align-none"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-11152 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1.png" alt="" width="1355" height="311" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1.png 1355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1-437x100.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1-768x176.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1-71x16.png 71w" sizes="(max-width: 1355px) 100vw, 1355px" /></figure>
<p>&nbsp;</p>
<p>The methodology aligns well with industry best practices and is tailored to financial services. However, the sequence of questions to determine an organization’s inherent risk is likely to have most if not all financial institutions rated at Level 1 or 2. For example, any organization collecting and/or managing end-consumer Personally Identifiable Information (PII) would be designated a Level 2: Significant risk. While coverage of PII and privacy in general is welcome in a context of increased privacy concerns, it may not be so relevant from an inherent risk perspective.</p>
<p>Qualitative assessments, such as the one proposed here, are relevant for smaller institutions, but bringing cybersecurity risk management practices closer in maturity to those of credit and market risk management would require leveraging quantitative assessment methodologies. The recent paper <a href="https://www.imf.org/en/Publications/WP/Issues/2018/06/22/Cyber-Risk-for-the-Financial-Sector-A-Framework-for-Quantitative-Assessment-45924" target="_blank" rel="nofollow noopener noreferrer">Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment</a> from an IMF economist points in that direction.</p>
<p>&nbsp;</p>
<h2><strong>Significant changes to the Framework Core and diagnostic statements</strong></h2>
<p>The profile builds on to the Framework Core with two new functions: “Governance” and “Supply Chain/Dependency Management.” These additions put more emphasis on key areas, but at the cost of changing the well-known “Identify-Protect-Detect-Respond-Recover” structure, which is helpful for communicating with business and senior management.</p>
<p>The profile does not stop here, as it also increases the number of Categories and Subcategories, +8 and +20 respectively. While these additions are mostly relevant, they are not specific to Financial Services and could therefore be added to the Framework Core itself.</p>
<p>Based on this structure, the profile defines 300 diagnostic statements leveraging again the FFIEC CAT and other resources from NYS DFS, FSB, and CPMI-IOSCO.</p>
<p><img decoding="async" class="aligncenter wp-image-11154 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2.png" alt="" width="1356" height="848" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2.png 1356w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-768x480.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-62x39.png 62w" sizes="(max-width: 1356px) 100vw, 1356px" /></p>
<p>&nbsp;</p>
<h2><strong>More precise assessment criteria</strong></h2>
<p>When utilizing the NIST CSF, the FFIEC CAT, or any other generic framework or tool, most firms at some point end up defining specific potential answers to assessment criteria. Indeed, firms may have protection mechanisms in place, but they may not be consistently deployed across all assets. Similarly, while a measure may not yet be in place, a clear path forward may have been defined. Such scenarios are relevant to reflect an organization’s cybersecurity maturity.</p>
<p>The profile addresses this issue by proposing seven possible answers which successfully address common scenarios: “Not Applicable,” “Yes,” “Yes-Risk Based,” “Yes-Compensating Controls Used,” “Partial-Ongoing Project w/Action Plan,” “Not Tested,” and “No.” This addition is certainly an important step toward more consistent framework use and a foundation for maturity measures across organizations and across industries.</p>
<p>&nbsp;</p>
<h2><strong>The need to think global</strong></h2>
<p>The proposed profile is currently presented as U.S.-centric. Indeed, most questions in the risk-tiering section and most diagnostic statement references relate to U.S. references. While this focus would be helpful for initial adoption in the U.S. market, it could be a barrier to expansion moving forward. Country-specific references are helpful, but the Profile itself should be kept as generic as possible, with U.S. references provided as add-ons only. FSSCC peers could then develop other add-ons at the country or region-level.</p>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter wp-image-11156 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3.png" alt="" width="1358" height="167" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3.png 1358w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3-437x54.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3-768x94.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3-71x9.png 71w" sizes="(max-width: 1358px) 100vw, 1358px" /></p>
<p>&nbsp;</p>
<p>Moreover, the proposed profile must further address the challenge of managing different maturity levels across geographies. Given the pervasive nature of cyber risk, shouldn’t organizations ensure a consistent maturity across geographies unless sufficient segregation is ensured? As challenging as it sounds, the magnitude of risk certainly justifies this approach.</p>
<p>As regulations are introduced worldwide and organizations are more and more global, managing complexity and avoiding inconsistencies necessitate a common framework. The Financial Services Profile as intended by the FSSCC has an important role to play in this respect. More than a pragmatic approach to leverage the NIST CSF, it aims at greater regulatory harmonization and streamlined regulatory compliance efforts. It is laudable and certainly long-anticipated by organizations.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/nist-fsscc-team-up/">NIST and FSSCC Team Up for Financial Services Cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The trends of Trump&#8217;s Cyber Regulation</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/04/trends-trumps-cyber-regulation/</link>
		
		<dc:creator><![CDATA[Jean-Jacob Dreyfus]]></dc:creator>
		<pubDate>Fri, 28 Apr 2017 11:32:43 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[sectoral regulations]]></category>
		<category><![CDATA[US]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9702/</guid>

					<description><![CDATA[<p>On January 31, 2017, President Trump postponed the signature of the Executive Order on cybersecurity, which was expected to lay the groundwork of the United States’ efforts to fight cyber threats in the coming years. The presidential race was marked...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/04/trends-trumps-cyber-regulation/">The trends of Trump&#8217;s Cyber Regulation</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>On January 31, 2017, President Trump postponed the signature of the Executive Order on cybersecurity, which was expected to lay the groundwork of the United States’ efforts to fight cyber threats in the coming years.</em></p>
<p>The presidential race was marked by a strong emphasis on cybersecurity. The topic, considered during the campaigns as “one of the most important challenges the next president is going to face” (Hilary Clinton, Derry, New Hampshire, February 3, 2016) and “an immediate and top priority,” (Donald Trump, Herndon, Virginia, October 3, 2016) was on the agendas of both final candidates, who expressed a strong willingness to better protect the country’s “cyberspace.” Furthermore, the leakages from various political organizations during the electoral process highlighted the weaknesses of the society against cyber threats.</p>
<p>&nbsp;</p>
<h2>U.S. critical infrastructure sectors, such as financial services, transportation systems, and energy, will inevitably have a role to play.</h2>
<p>The cyber community is now eager to see the new government’s cybersecurity plan. In addition to federal agencies, private institutions that are heavily involved in U.S. critical infrastructure sectors, such as financial services, transportation systems, and energy, will inevitably have a role to play.</p>
<p>Significant efforts have been made to increase cybersecurity in the U.S. and abroad. A common trend is to improve protection of what is generally called critical infrastructure. To that end, the previous U.S. administration launched several governmental initiatives, including the development of the Framework for Improving Critical Infrastructure Cybersecurity by NIST (“<a href="https://www.nist.gov/cyberframework">NIST Cybersecurity Framework</a>”). The framework is used worldwide aside major standards and is now being updated. In 2016, the <a href="https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan">Cybersecurity National Action Plan</a> (CNAP), planned to increase the country’s Federal budget for cybersecurity to $19 billion in 2017. In Europe, <a href="https://ec.europa.eu/digital-single-market/en/network-and-information-security-nis-directive">the Directive on Security of Network and Information Systems</a> (“NIS Directive”) requires Member States to adopt and publish sufficient laws and regulations to protect essential services. This is a global trend which is already visible in many countries such as France with the <a href="https://www.legifrance.gouv.fr/eli/loi/2013/12/18/DEFX1317084L/jo/texte">LPM</a> law and China through the recently enacted <a href="http://www.chinalawtranslate.com/cybersecuritydraft/?lang=en">Cybersecurity Law</a>. Even international organizations such as NATO are promoting critical infrastructure cybersecurity protection.</p>
<p><strong>Will President Trump focus the country’s cybersecurity program on critical infrastructure?</strong></p>
<h2></h2>
<h2>The two draft Executive Orders released show the new administration is seriously considering the issue.</h2>
<p>The first draft <a href="https://apps.washingtonpost.com/g/documents/world/read-the-trump-administrations-draft-of-the-executive-order-on-cybersecurity/2306/">Executive Order Strengthening U.S. Cyber Security and Capabilities</a> suggests President Trump will order an extensive review of the country’s weaknesses, strengths, and enemies within an aggressive timeline. The previous administration initiated similar effort less than a month after taking office in 2009, resulting in the rather theoretical <a href="http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf">Cyberspace Policy Review</a>.</p>
<p>This draft focuses on the following initiatives:</p>
<ul>
<li><strong>Vulnerabilities</strong> – Review most critical cyber vulnerabilities and submit a list of initial recommendations for enhanced protection of national security systems and most critical infrastructure;</li>
<li><strong>Adversaries</strong> – Review principal cyber adversaries and submit a first report on their identities, capabilities, and vulnerabilities;</li>
<li><strong>Capabilities</strong> – Review relevant cyber capabilities and identify an initial set needing improvements to adequately protect critical infrastructure; review efforts to educate and train the cyber workforce and make recommendations for the future;</li>
<li><strong>Incentives</strong> – Propose options to incentivize private sector adoption of effective cybersecurity measures and submit recommendations.</li>
</ul>
<p>&nbsp;</p>
<h2>Leveraging incentives reduces the immediate need for additional regulation or legislation.</h2>
<p>While the review of vulnerabilities, adversaries, and capabilities is consistent with actions taken by foreign governments, a more original approach may be taken to ensure adoption of cybersecurity measures by the private sector. Indeed, the focus on Leveraging incentives reduces the immediate need for additional regulation or legislation, which echoes well President Trump’s “Two-for-One” Regulation Executive Order. On the contrary, in Europe, the NIS Directive calls for “effective, proportionate, and dissuasive penalties” to ensure requirements are fulfilled.</p>
<p>Based on currently available information, it is difficult to discern how and to what extent the government would be able to fully execute these initiatives, as they are relatively sweeping in scope. However, the assessment of tangible vulnerabilities and adversaries may indicate a willingness to focus on launching concrete actions.</p>
<p>The second draft <a href="https://lawfareblog.com/revised-draft-trump-eo-cybersecurity">Executive Order Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure</a> is similarly ambitious, ordering the government to produce no less than 11 reports and requiring the involvement of the whole executive branch of the Federal Government and critical infrastructure actors.</p>
<p>This draft retains the initiatives on vulnerabilities and capabilities from the first draft, but the scopes are quite different. It suggests more stringent effort will be made on the protection of executive branch and less on critical infrastructure. Among other things, the government here aims to:</p>
<ul>
<li>Hold heads of executive departments and agencies accountable for managing cyber risk. This follows a trend already adopted by regulators in the financial services sector, for example through the <a href="http://www.dfs.ny.gov/about/press/pr1702161.htm">NYS-DFS 23 NYCRR 500 Cybersecurity Requirements for Financial Services Companies</a>  and the <a href="https://www.nfa.futures.org/nfamanual/NFAManual.aspx?RuleID=9070&amp;Section=9">NFA Interpretive Notice on Information Systems Security Programs</a> (ISSP). Bringing accountability to the senior management level is a necessary step toward reinforced focus on cybersecurity and inclusion at the enterprise level, beyond technology departments;</li>
<li>Generalize the use of the NIST Cybersecurity Framework. While the framework was originally intended for critical infrastructure, it is easy to imagine it applied to federal agencies. It would likely complement and structure the usage of other materials such as <a href="https://www.nist.gov/publications/minimum-security-requirements-federal-information-and-information-systems">the NIST FIPS PUB 200 Minimum Security Requirements for Federal Information and Information Systems</a> and <a href="https://www.nist.gov/news-events/news/2013/04/nist-issues-major-revision-core-computer-security-guide-sp-800-53">the NIST SP 800-53 Security and Privacy Controls for Federal Information Systems and Organizations</a>, which agencies are already required to leverage under <a href="https://www.gpo.gov/fdsys/pkg/STATUTE-116/pdf/STATUTE-116-Pg2899.pdf">the Federal Information Security Management Act of 2002</a> (FISMA). It would also increase alignment of practices between the public and private sectors;</li>
<li>Review executive departments’ and agencies’ risk management practices and actual risk decisions, assess whether they are appropriate and sufficient, as well as develop a plan for improvement. Such effort is consistent with the first draft but this time applies only to the executive branch;</li>
<li>Develop a plan to modernize IT architecture by transitioning to shared IT services and consolidating network architecture, especially for National Security Systems. Shared IT services allow for increased security through industrialization, and consolidated network architectures are easier to protect and monitor.</li>
<li>Identify authorities and capabilities to support cybersecurity efforts of entities managing critical infrastructure at greatest risk in case of cyber attack, in collaboration with those entities. The notion of critical infrastructure at greatest risk originates from <a href="https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity">President Obama’s Executive Order 13636 Improving Critical Infrastructure Cybersecurity</a>;</li>
<li>Assess the Federal policies and practices efficiency to promote market transparency of cyber risk management. No more incentives here, but a market-driven approach to foster extended cybersecurity measures among the private sector, and no reference to any new regulation;</li>
<li>Identify and promote initiatives to improve resiliency of core telecommunications infrastructure. Those initiatives, likely at the Internet service provider level, would mainly focus on <a href="https://media.licdn.com/mpr/mpr/AAEAAQAAAAAAAA1xAAAAJDAzZmJkMGZkLWQ2NTctNDk0ZC05YmI1LTZkZmE2NDg1YTRkZQ.png">preventing continuously increasing distributed attacks</a>.</li>
</ul>
<figure id="post-9703 media-9703" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9703 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/US-article-Trump.png" alt="" width="910" height="513" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/US-article-Trump.png 910w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/US-article-Trump-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/US-article-Trump-768x433.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/US-article-Trump-69x39.png 69w" sizes="auto, (max-width: 910px) 100vw, 910px" /></figure>
<h2></h2>
<h2>The initiatives described in the two drafts are aligned with general market practices and are headed in the right direction.</h2>
<p>Overall, the initiatives described in the two drafts are aligned with general market practices and are headed in the right direction. However, some uncertainty remains on a number of topics such as privacy and protection of PII, and private-public collaboration. Moreover, as American technology companies that have historically stored their data in the U.S. are opening more and more data centers abroad to meet local regulatory requirements, the U.S. will have to define their own data localization requirements.</p>
<p>&nbsp;</p>
<h2>The challenge for the new administration is to develop unified data protection policies to drive consistent regulations</h2>
<p>The U.S. has led the effort in defining modern cybersecurity tools such as the NIST Cybersecurity Framework and the <a href="https://www.ffiec.gov/cyberassessmenttool.htm">FFIEC Cybersecurity Assessment Tool</a> but now needs to focus on execution. The challenge for the new administration is to develop unified data protection policies to drive consistent regulations, and move from a theoretical approach to concrete results.</p>
<p>If we are to expect actual results, the effort should enable a country-wide response that is transversal and coordinated, with sufficient oversight. Putting in charge a single agency, as announced by White House officials moments before the President’s signature was called off, may well be a first step in that direction. The new administration will have to define clear roles and responsibilities between the public and private sectors, a governance for collaboration, and a strategy to drive implementation.</p>
<p>Beyond this transformation, the upcoming challenge will be on the collaboration with other countries to align with foreign initiatives with a NATO-like approach, with the objective to drive harmonization of standards and requirements for a more efficient approach to cybersecurity. Stakes and expectations are higher than ever.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/04/trends-trumps-cyber-regulation/">The trends of Trump&#8217;s Cyber Regulation</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
