Federal Finance Council Learns Hard Lesson: Cyber Compliance Can't Be Onerous
Burdensome cybersecurity procedures aren't much better than zero cybersecurity procedures, since people are less likely to engage with solutions that induce headaches or impede functionality.
April 15, 2019 at 09:30 AM
4 minute read
At least they care enough to ask. Four members of the Federal Financial Institutions Council—the Office the Comptroller of the Currency, the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation and the National Credit Union Administration—want to know if financial institutions find the Council's cybersecurity assessment tool too burdensome.
It's not an altogether odd question, as organizations deploying their own cybersecurity tools and procedures in response to increased regulatory pressures have discovered.
“If the security solution makes usability untenable, then it's not really a solution because people will bypass it,” said Behnam Dayanim, a partner at Paul Hastings.
Ideally, a cyber solution will fit organically into the systems that employees are already using. According to Dayanim, user compliance begins to drop off once extra steps are introduced into the process.
The issue is more prevalent in some industries than others. Dayanim noted that employees working in the financial services sector might be more accustomed to working in the shadow of heavy regulation and engaging with restrictive IT on a daily basis.
But there is a limit to how much disruption an organization can take. “When you implement policies, standards and procedures which enhance privacy and security, it can absolutely impact functionality,” said Phyllis Sumner, head of the privacy and security practice at King & Spalding.
She's seen this happen inside law firms too, where the need to obtain information quickly has to be counterbalanced against privacy and security concerns. When consulting with clients outside of the firm, Sumner said attorneys need to take creative approaches to problems rather than creating additional obstacles to a company's operations or falling back on the word “no.”
Occasionally there's not a compromise or creative alternative to be found, and companies decide to accept a risk rather than adopt a measure that could hinder business. Those instances can be compiled into a risk register that can be tracked on an ongoing basis.
“Those risks can change, so part of the process should be to review that risk register on a regular basis and revise policies and procedures or other issues relating to technology as the [regulatory] landscape changes,” Sumner said.
The areas where companies do decide to implement new cybersecurity protocols or tools need to be treated with care. Success can have less to do with the hardware involved than the people.
Andrew Konia, a partner and chair of the Data Privacy and Security team at McGuireWoods, pointed out that asking employees in an organization to take on additional responsibilities that will not be reflected in their paycheck is inherently a tough sell. And the truth is that they really need to buy it.
“They need to be engaged. This is a critical function. It's critical to the health of the company, it's critical to the success of a company,” Konia said.
While it's perhaps not the sexiest cyber solution on the block, a consistent message backed by clearly delineated responsibilities and regular checkups can work wonders. Once timetables and expectations have been established, it's easier to hold people accountable.
In some cases, otherwise strong workers are being asked to perform cyber-related functions that exist outside of their preexisting skillset. Without proper training, intimidation can become a handy excuse not to engage with risk protocols.
“These people are undertaking sometimes a very new task to them. They need support, they need some guidance, they need to feel the love,” said Konia.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250