WHITE PAPER HOW I.T. HELPS FINANCIAL FIRMS MEET REGULATORY MANDATES The right solutions and services can help capital markets firms navigate the compliance minefield. EXECUTIVE SUMMARY Regulatory compliance is a major consideration in any capital market firm’s cybersecurity strategy. Not only will financial institutions lose the trust of their customers in the event of a data breach, but they also operate within a framework of stringent regulations that govern how they must manage data. Keeping up with these regulatory demands is a major challenge — especially for smaller firms that lack the resources of their larger competitors — and running afoul of the rules can bring stiff penalties, even when customer financial data hasn’t been exposed. The strategic deployment of key technologies and services can help ease this burden, allowing institutions to focus more attention on their core business. A trusted partner can help capital markets firms make sure they are meeting all of the mandates of the regulations that govern them. Technology solutions can also bolster compliance efforts while improving security as well. FINANCIAL COMPLIANCE CDW.COM/SECURITY | 888.706.4239 A Minefield of Compliance Issues 2 institutions to keep records of cash purchases Financial institutions face a patchwork of of negotiable instruments, to file reports of cash various regulations with which they must transactions exceeding $10,000 per day and to comply. Some of the most significant include: report actions that point to criminal activity. Gramm-Leach-Bliley Act: This 1999 law SEA Rule 17a-4: Rule 17a-4 of the Securities requires financial institutions to safeguard Exchange Act of 1934 specifies the manner in which information such as account numbers, credit broker-dealers must create and maintain a number of and income histories, and Social Security different records, including trade blotters, asset and numbers. Organizations must take several liability ledgers, income ledgers, customer account The percentage of financial steps to ensure compliance, including ledgers, securities records, order tickets, trade services firms that cite cyber risk as a top-five risk identifying and assessing the risks to confirmations, trial balances and employment-related to the broader economy.1 customer information in each relevant area documents. The rule was updated in 1997 to allow firms of the company’s operations. The measure to store records electronically. Certain records must also requires capital markets firms to provide be stored for a minimum of six years, with the records customers with privacy notices that explain their informationkept in “an easily accessible place” for the first two of those years. sharing practices. Dodd-Frank Act: Passed in the wake of the 2008 financial Services to Help Manage industry collapse, and primarily meant to lower overall risk in the the Regulatory Burden sector, this 2010 legislation also requires financial institutions to With so many different regulations to manage, many financial share confidential data with regulatory agencies. Some observers institutions turn to trusted IT partners like CDW to provide have also expressed concerns that the law’s expansion of security and compliance services. These services include: whistleblower rewards, and provisions to grant consumers broader Penetration testing: In a penetration test, security experts access to their information, could weaken information security. assume the role of hacker, running creative, in-depth analyses USA PATRIOT Act: This landmark 2001 antiterrorism law to determine whether security controls are operating as requires that all financial institutions implement a Customer intended. By attempting to gain access to corporate resources, Identification Program. To comply, capital markets firms and these experts are able to find holes and weaknesses within an brokerages must verify the identity of any person seeking organization’s cybersecurity infrastructure, providing valuable to open an account, and maintain records of that verification information about vulnerabilities before malicious actors can process for five years after the account is closed. exploit them. CDW’s experts then use the information gleaned Bank Secrecy Act: This 1970 law (formally, the “Currency from the test to craft customized and prioritized cybersecurity and Foreign Transactions Reporting Act”) requires financial roadmaps that shore up weaknesses and protect IT systems and assets. Often, the results of a penetration test help convince previously hesitant stakeholders within an organization (usually those outside of the IT department) that further investments in Compliance vs. Security cybersecurity are warranted. NIST assessments: The National Institute of Standards and Security and regulatory compliance are Technology (NIST) has established a Cybersecurity Framework both top concerns for capital markets for federal agencies to follow. The guidance for agencies firms. In its “Capital Markets 2020” report, applies to capital markets firms as well as brokerages. During PricewaterhouseCoopers found that 19 percent a NIST assessment, CDW places cybersecurity experts onsite of firms say that regulatory compliance will be one of their at an organization to gather in-depth information about the top three challenges through 2020. Similarly, 19 percent cited enterprise’s existing practices. These experts speak with increasing cyberthreats as a major challenge. representatives from various company departments, such Still, as many IT professionals at these firms already know, mere as human resources and payroll, to better understand the compliance is not enough. organization’s IT processes, policies and other safeguards “You can bamboozle an auditor with a policy that nobody knows, (such as employee background checks) that may or may not but that doesn’t really help,” says Mark Lachniet, a CDW security be in place. From these conversations, CDW can determine the solutions manager. “Or, a compliance checklist might include an greatest sources of cybersecurity risk. Then, CDW’s experts intrusion prevention system that a lot of people have built into create a list of recommendations, ranking each solution by what their firewall, but it’s never been properly configured, and nobody it will cost the organization and how much of a security gain it monitors it.” represents; this helps reduce cybersecurity risk in the most targeted and cost-effective manner possible. In short, solutions that are adequate for passing a compliance Configuration services: When financial institutions bring in a audit may not be sufficient to keep an organization’s information partner such as CDW to configure new hardware and software safe. “Compliance does not equal security,” Lachniet says. — or to check on the configuration of existing solutions — they can be confident that they are taking advantage of all the 70% SOURCE: 1 Depository Trust & Clearing Corporation, “Systemic Risk Barometer,” December 2015 FINANCIAL COMPLIANCE CDW.COM/SECURITY | 888.706.4239 3 cybersecurity features these tools have These include: to offer, and that these systems are not Wireless security and management: With users exposing them to unnecessary vulnerabilities. routinely bringing two or more personal devices Configuration services are helpful for into work with them, it is crucial that capital markets optimizing the cybersecurity performance of firms and brokerages deploy sophisticated tools that firewalls, network switches, databases and give them visibility and control over their wireless other IT tools and systems. networks. (Some users have even been known Managed services: Especially in complex to bring wireless routers into the office to create environments such as capital markets firms their own mobile hotspots.) In addition to giving The percentage of and brokerages, cybersecurity is not merely a IT managers real-time visibility into their wireless security incidents at financial institutions for matter of deploying the right tools and letting networks, cloud-based wireless management which current and former them run. Experienced IT professionals must platforms speed up deployment and allow financial 2 employees are responsible. also constantly monitor these solutions, institutions to quickly scale up their networks as they watching carefully for any anomalous activity grow or merge with other organizations. and taking appropriate action when a threat is detected. Smaller Anti-virus/anti-malware software: While virtually all financial organizations, in particular, often lack the staff resources to institutions run anti-virus and anti-malware tools in their IT appropriately monitor and maintain cybersecurity tools, and environments, many do not take full advantage of the features that therefore may choose to outsource these services to a partner these tools offer. In some cases, organizations activate no more with the expertise to keep the organization safe. than 20 or 30 percent of optional features, missing out on benefits Phishing and ransomware services: The number and such as desktop firewalls, host-based intrusion prevention sophistication of phishing attempts have increased in recent systems and tools that send alerts when potential threats are years. Further, research conducted by information security detected. Organizations can also improve the performance of provider Phishme indicates that 93 percent of phishing emails their anti-virus and anti-malware tools by investing in “upstream” contain ransomware. Security providers can help capital markets solutions, such as next-generation firewalls, web gateways, and firms address these threats through services such as phishing cloud-enabled malware inspection and sandboxing tools that intelligence and advanced user training. reduce the burden on endpoint protection software. Incident response: No matter how carefully capital markets Data storage and encryption: Like all organizations, capital firms work to protect their IT assets, breaches can still happen. markets firms, brokerages and other financial institutions When they do, it is important for these institutions to respond must consider three factors when architecting data storage quickly and strategically, not only to root out the cause of the solutions components: confidentiality, integrity and availability. problem and prevent further damage, but also to fulfill their Confidentiality requires that data be made available only to obligations to notify account holders of the breach and to authorized users, while integrity refers to the need to maintain preserve evidence. CDW works with partners that specialize in consistency, accuracy and trustworthiness over the lifecycle cybersecurity forensics and can help institutions rebound from of the data. Availability simply means that data can be accessed incidents as quickly as possible. CDW’s experts can also help when and where it is needed. Each of these three components organizations implement disaster recovery solutions. is crucial to both cybersecurity and regulatory compliance. Additionally, regulations require that certain types of data be The Technology of Compliance encrypted while in storage, while in transit or both. A number of IT solutions are either mandated by regulations or Authentication and access management: Sophisticated can help financial institutions meet their compliance demands. access management tools allow financial firms to operate 64% The Growing Need for HPC in Security and Compliance The use of high-performance computing (HPC) for security and compliance has generally been limited to the biggest financial institutions, because they have the resources necessary to implement this technology. However, these solutions are becoming more mainstream, and capital markets firms are likely to consider adopting them over the next decade. Here are three ways HPC can improve cybersecurity: Real-time traffic monitoring: By simultaneously monitoring thousands of entry points on IT networks, HPC solutions can detect anomalies and shut down attacks before they inflict extensive damage. Advanced fraud detection: Through real-time monitoring and analysis of millions of payment card transactions, HPC systems can detect suspicious patterns, and can also prevent legitimate transactions from being flagged as fraudulent. Past intrusion identification: In addition to monitoring current activity, HPC tools can be used to explore past intrusions, giving organizations information on how hackers have circumvented their existing cybersecurity solutions. SOURCE: 2PricewaterhouseCoopers, “The Global State of Information Security Survey 2016,” October 2015 FINANCIAL COMPLIANCE CDW.COM/SECURITY | 888.706.4239 according to “the principle of least privilege,” meaning users are able to access only the systems, resources and data that they need to do their jobs, and no more. Authentication and access management tools make it simple for organizations to grant access by identity and user role, and can prohibit noncompliant devices from assessing critical applications. In addition, the auditing features of such solutions allow organizations to track who has accessed resources and when, providing valuable information in the event of a data breach. Data loss prevention (DLP) solutions: DLP tools can track and protect data wherever it travels on an enterprise network CDW: A Financial Industry Partner That Gets IT For nearly 30 years, CDW has helped more than 15,000 banks, credit unions, capital markets firms and specialty financial services companies assess and improve their IT infrastructure. CDW’s partnerships with leading IT manufacturers give these financial institutions access to the industry’s leading technology, and CDW’s solutions experts have the knowledge and experience to help organizations choose the right security tools and create a customized regulatory compliance plan. — on desktops, mobile devices, storage, file-sharing, email and even in the cloud. To get the full benefit of these powerful tools, organizations must focus not only on the technology, but also on the people and processes surrounding the solution. The team assigned to monitor DLP tools must know what sorts of incidents they are watching for, and team members must have the authority to make decisions and take action when an incident occurs. With a thorough risk assessment and an understanding of a company’s business processes, IT managers can deploy DLP tools in a targeted manner so that they protect the most sensitive data in the enterprise. The CDW approach to customer service includes: o learn more about how CDW solutions T and services can help capital markets firms secure their systems and data, visit CDW.com/security. DISCOVER An initial discovery session to understand your goals, requirements and budget ASSESS An assessment of your existing environment and definition of project requirements EVALUATE Detailed manufacturer evaluations, recommendations, future environment design and proof-of-concept DEPLOY Procurement, configuration and deployment of a security solution SUPPORT Ongoing product lifecycle support You CDW Tenable SecurityCenter Continuous View™ (SecurityCenter CV™) lets you see into the shadows. SecurityCenter CV delivers total visibility of known and unknown assets on your network. Tenable’s passive traffic and event monitoring tools detect devices, services and applications in use, and identify associated vulnerabilities so you can quickly and easily determine your relative risk and exposure. With Tenable, bring shadow IT into the light so it’s not a risk to your organization. 4 Zscaler ® protects your employees from malware, viruses, advanced persistent threats and other risks, and can also stop inadvertent or malicious leaks of your company's sensitive data. Our security services scan and filter every byte of your network traffic, including SSL-encrypted sessions, as it passes to and from the Internet. Give your executives instant insight into threats and get real-time recommendations on how to improve your security posture. The information is provided for informational purposes. It is believed to be accurate but could contain errors. CDW does not intend to make any warranties, express or implied, about the products, services, or information that is discussed. CDW®, CDW•G ® and PEOPLE WHO GET IT ™ are registered trademarks of CDW LLC. All other trademarks and registered trademarks are the sole property of their respective owners. Together we strive for perfection. ISO 9001:2000 certified MKT11697— 7/1 — ©2016 CDW LLC The Trend Micro™ Smart Protection™ Suites provide better, simpler, more flexible security. This connected suite delivers the best protection at multiple layers using the broadest range of antimalware techniques available.
© Copyright 2025 Paperzz