BROWSE BY TOPIC
- Bad Brokers
- Compliance Concepts
- Investor Protection
- Investments - Unsuitable
- Investments - Strategies
- Wall Street News
- Investments - Private
- Rules & Regulations
- Bad Advisors
- Boiler Rooms
- Terminations/Cost Cutting
- General News
- Donald Trump & Co.
- Big Banks
- Regulatory Sanctions
Stories of Interest
- Sarah ten Siethoff is New Associate Director of SEC Investment Management Rulemaking Office
- Catherine Keating Appointed CEO of BNY Mellon Wealth Management
- Credit Suisse to Pay $47Mn to Resolve DOJ Asia Probe
- SEC Chair Clayton Goes 'Hat in Hand' Before Congress on 2019 Budget Request
- SEC's Opening Remarks to the Elder Justice Coordinating Council
- Massachusetts Jury Convicts CA Attorney of Securities Fraud
- Deutsche Bank Says 3 Senior Investment Bankers to Leave Firm
- World’s Biggest Hedge Fund Reportedly ‘Bearish On Financial Assets’
- SEC Fines Constant Contact, Popular Email Marketer, for Overstating Subscriber Numbers
- SocGen Agrees to Pay $1.3 Billion to End Libya, Libor Probes
- Cryptocurrency Exchange Bitfinex Briefly Halts Trading After Cyber Attack
- SEC Names Valerie Szczepanik Senior Advisor for Digital Assets and Innovation
- SEC Modernizes Delivery of Fund Reports, Seeks Public Feedback on Improving Fund Disclosure
- NYSE Says SEC Plan to Limit Exchange Rebates Would Hurt Investors
- Deutsche Bank faces another challenge with Fed stress test
- Former JPMorgan Broker Files racial discrimination suit against company
- $3.3Mn Winning Bid for Lunch with Warren Buffett
- Julie Erhardt is SEC's New Acting Chief Risk Officer
- Chyhe Becker is SEC's New Acting Chief Economist, Acting Director of Economic and Risk Analysis Division
- Getting a Handle on Virtual Currencies - FINRA
We seek to provide information, insights and direction that may enable the Financial Community to effectively and efficiently operate in a regulatory risk-free environment by curating content from all over the web.
Stay Informed with the latest fanancialish news.
NEWSLETTERS & ALERTS
SEC Observations from Cybersecurity Exams of Brokers, Advisors, Funds
On Monday, OCIE issued its findings on the cybersecurity preparedness of financial services firms – including preparedness including broker-dealers (B/Ds), investment advisers (RIAs), and investment companies (RICs) registered with the SEC.
As part of its Cybersecurity 2 Initiative, the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) examined 75 firms to assess industry practices and legal and compliance issues associated with cybersecurity preparedness. The "Cybersecurity 2 Initiative" built upon prior cybersecurity examinations, particularly OCIE’s 2014 "Cybersecurity 1 Initiative."
The examinations focused on the firms’ written policies and procedures (WSPs) regarding cybersecurity, including validating and testing that such policies and procedures were implemented and followed. In addition, the staff sought to better understand how firms managed their cybersecurity preparedness by focusing on the following areas: (1) governance and risk assessment; (2) access rights and controls; (3) data loss prevention; (4) vendor management; (5) training; and (6) incident response.
ELEMENTS OF ROBUST POLS AND PROCEDURES (BEST PRACTICES). During these examinations, the staff observed several elements that were included in the pols and procedures of firms that the staff believes had implemented robust controls. Firms may wish to consider the following elements as they could be useful in the implementation of cybersecurity-related pols and procedures.
- Maintenance of an inventory of data, information, and vendors. Pols and procedures included a complete inventory of data and information, along with classifications of the risks, vulnerabilities, data, business consequences, and information regarding each service provider and vendor, if applicable.
- Detailed cybersecurity-related instructions. Examples included:
► Penetration tests – pols and procedures included specific information to review the effectiveness of security solutions.
► Security monitoring and system auditing – pols and procedures regarding the firm’s information security framework included details related to the appropriate testing methodologies.
► Access rights – requests for access were tracked, and pols and procedures specifically addressed modification of access rights, such as for employee on-boarding, changing positions or responsibilities, or terminating employment.
► Reporting – pols and procedures specified actions to undertake, including who to contact, if sensitive information was lost, stolen, or unintentionally disclosed/misdirected.
- Maintenance of prescriptive schedules and processes for testing data integrity and vulnerabilities. Examples included:
► Vulnerability scans of core IT infrastructure were required to aid in identifying potential weaknesses in a firm’s key systems, with prioritized action items for any concerns identified.
► Patch management policies that included, among other things, the beta testing of a patch with a small number of users and servers before deploying it across the firm, an analysis of the problem the patch was designed to fix, the potential risk in applying the patch, and the method to use in applying the patch.
- Established and enforced controls to access data and systems. For example, the firms:
► Implemented detailed “acceptable use” policies that specified employees’ obligations when using the firm’s networks and equipment.
► Required and enforced restrictions and controls for mobile devices that connected to the firms’ systems, such as passwords and software that encrypted communications.
► Required third-party vendors to periodically provide logs of their activity on the firms’ networks.
► Required immediate termination of access for terminated employees and very prompt (typically same day) termination of access for employees that left voluntarily.
- Mandatory employee training. Information security training was mandatory for all employees at on-boarding and periodically thereafter, and firms instituted pols and procedures to ensure that employees completed the mandatory training.
- Engaged senior management. The pols and procedures were vetted and approved by senior management.