“Under the new regulations, banks are now required to scrutinize their suppliers, and to report on breaches that affect them. Since many of these suppliers might also have access to internal banking systems, those with remote access might be the leverage that an attacker would use to cross the perimeter, move laterally and take what they’re after, as happened with the Target breach.
“Requiring that breaches are reported is a good first step forward in improving detection of breaches, but is it enough? It’s a manual process that occurs after-the-fact of an attack. A more proactive approach would be to require close monitoring and analysis of suppliers’ activities in real time with automated tools. This would shorten breach and threat discovery, enabling institutions to avert or minimize breach impacts.”
Jeff Hill, Director of Product Management at Prevalent:
“For obvious reasons, the State of New York has a vested interest in the health of a financial industry critical to the State’s economic engine. And – as these new rules are testament to – more and more, regulators, state agencies, investors, and other stakeholders are connecting the dots between financial health and cyber security. The economic wake of a substantial data breach can stretch for years, impacting not only tangible bottom line results, but also inflicting reputational damage that can linger indefinitely. New York State’s new rules are particularly forward-looking in that they emphasize the importance of understanding and managing 3rd party risk, the source of more than half of all breaches according to a number of studies. Addressing what is often the soft underbelly of many enterprises’ cyber security defenses – third parties/vendors – the State of New York is forcing a critical element of its economic infrastructure to cover all its bases.”
“New York State’s new cybersecurity rules are an important step forward in acknowledging the important role of biometric and risk-based authentication in stopping hacking attacks against online and mobile banking. Billions of dollars are being lost to fraud every year, and modern methods of authentication that eliminate the outdated use of passwords and instead rely on the new and transparent technologies are far more effective.”
“In recent time, the regulatory pendulum has begun to swing in favor of a “lighter” approach for banks, financial services and for other industries too, for that matter. It’s good to see, however, that good sense regulations like this one have survived to offer additional consumer protection via thorough evaluations of third party vendors, comprehensive risk assessments and advocacy for stronger multi-factor authentication.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.