FINRA Report on Best Cybersecurity Practices Is Must-Read, Alston & Bird Lawyer Says
Cybersecurity practices must “be appropriately tailored to the entity. It should be risk-based, based on risk to your organization,” said Peretti, who formerly was a senior litigator for the U.S. Department of Justice's Computer Crime and Intellectual Property Section.
February 04, 2019 at 04:34 PM
5 minute read
“Cybersecurity practices need to be current and adaptable to the current threat landscape,” said Kimberly Kiefer Peretti, partner and co-chairwoman of Alston & Bird's cybersecurity preparedness and response team in Washington, D.C., speaking about the Financial Industry Regulatory Authority's latest Report on Selected Cybersecurity Practices 2018.
The recently released FINRA report provides guidance for broker-dealer firms of various sizes on how they can mitigate the risks of cyberattacks and data theft by other means. FINRA is a nonprofit self-regulatory organization that registers broker-dealers and enforces compliance with federal securities laws and FINRA rules, and is overseen by the U.S. Securities and Exchange Commission.
Steven Polansky, senior director, member supervision in FINRA's Washington, D.C., office, said on releasing the 2018 report: “There is no one-size-fits-all approach to cybersecurity, so FINRA has made a priority of providing firms with reports and other tools to help them determine the right set of practices for their individual business.”
It's an urgent topic as the number and severity of cyberattacks on financial institutions and others continue to rise. The SEC in September, for instance, announced that a Des Moines, Iowa-based broker-dealer and investment adviser, Voya Financial Advisors Inc., had agreed to pay $1 million to settle charges related to failures of cybersecurity policies and procedures that led to an intrusion that breached the personal information of thousands of customers. The SEC charged Voya Financial with violating the federal Safeguards Rule and Identity Theft Red Flags rule, its first enforcement action under the red flags rule. The intruders allegedly gained access to customer data by tricking the information technology help desk into resetting passwords by impersonating the financial representatives, who were independent contractors.
“This case is a reminder to brokers and investment advisers that cybersecurity procedures must be reasonably designed to fit their specific business models,” said Robert Cohen, chief of the SEC Enforcement Division's Cyber Unit, announcing the settlement. “They also must review and update the procedures regularly to respond to changes in the risks they face.”
The FINRA report covers how to defend against this type of security breach and others, and is broken down into five main topics: Cybersecurity controls in branch offices; methods of limiting phishing attacks; identifying and mitigating insider threats; elements of a strong penetration-testing program; and establishing and maintaining controls on mobile devices, according to a news release issued by the authority on the report's release. The report updates a similar one FINRA released in 2015.
The new report is more specific and more detailed than the 2015 edition, listing practices, for instance, on branch controls, including the need to provide written supervisory procedures. A section on phishing goes into depth on how to detect “phishing” emails that appear to be from other executives, higher-ups, customers, acquaintances or the company help desk and how to educate representatives and employees about them.
“It is written in terms of not just various controls but continuous review of effective practices that are used by other firms,” Peretti said, adding that the report gives insight into types of attacks that are prevalent but also how “various peer organizations are addressing it.”
For instance, at the branch level, the report advises “mandating that branch personnel notify branch management of and properly respond to violations of firm cybersecurity standards or material cybersecurity incidents involving loss of confidentiality, availability or integrity of customer personally identifiable information (PII) or sensitive firm data.”
Cybersecurity practices must “be appropriately tailored to the entity. It should be risk-based based on risk to your organization,” said Peretti, who formerly was a senior litigator for the U.S. Department of Justice's Computer Crime and Intellectual Property Section, and was a lead prosecutor of TJX hacker-ringleader Albert Gonzalez. Gonzalez conspired with other members of the ring to hack payment processors and networks gaining access over a period of several years to 180 million payment-card accounts at retailers, including TJX, Target Corp. and others. He was sentenced to a prison term of 20 years and a day in 2010.
Peretti said large and small institutions must stay up-to-date on the latest methods and techniques being used by organized criminals and state actors, and must upgrade technologies and training to keep up with their ever-evolving tactics.
Read More:
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All'The Unheard of Superpower': How Women's Soft Skills Can Drive Success in Negotiations
Tales From the Trenches: What Outside Counsel Do That GCs Find Inexcusable
Venus Williams Tells WIPL Crowd: 'Living Your Dreams Should Be Easy'
The 2024 WIPL Awards: Law Firm Mentor and Mentee Collaboration
Trending Stories
- 1Gibson Dunn Sued By Crypto Client After Lateral Hire Causes Conflict of Interest
- 2Trump's Solicitor General Expected to 'Flip' Prelogar's Positions at Supreme Court
- 3Pharmacy Lawyers See Promise in NY Regulator's Curbs on PBM Industry
- 4Outgoing USPTO Director Kathi Vidal: ‘We All Want the Country to Be in a Better Place’
- 5Supreme Court Will Review Constitutionality Of FCC's Universal Service Fund
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250