The Securities and Exchange Commission's (SEC's) exam division released on Monday a guide to best practices it's observed in exams to combat cybersecurity infractions, data loss, and privacy breaches.
In its 13-page Cybersecurity and Resiliency Observations report, the Office of Compliance Inspections and Examinations (OCIE) details practices examiners have observed in the following areas: governance and risk management, access and controls, data loss prevention, mobile security, incident response and resiliency, vendor management, and training and awareness.
In sharing the staff observations, OCIE said that it encourages market participants to review their practices, policies, and procedures with respect to cybersecurity and operational resiliency.
"We believe that assessing your level of preparedness and implementing some or all of the … measures will make your organization more secure," the report states.
"As markets, market participants, and their vendors have increasingly relied on technology, including digital connections and systems, cybersecurity risk management has become essential," the report adds.
"Indeed, in an environment in which cyber threat actors are becoming more aggressive and sophisticated—and in some cases are backed by substantial resources including from nation-state actors—firms participating in the securities markets, market infrastructure providers, and vendors should all appropriately monitor, assess, and manage their cybersecurity risk profiles, including their operational resiliency."
In the area of mobile security, for instance, "mobile devices and applications may create additional and unique vulnerabilities," the report notes.
OCIE has observed the following mobile security measures at organizations utilizing mobile applications:
- Policies and procedures. Establishing policies and procedures for the use of mobile devices.
- Managing the use of mobile devices. Using a mobile device management (MDM) application or similar technology for an organization's business, including email communication, calendar, data storage, and other activities. If using a "bring your own device" policy, ensuring that the MDM solution works with all mobile phone/device operating systems.
- Implementing security measures. Requiring the use of multi-factor authentication for all internal and external users. Taking steps to prevent printing, copying, pasting, or saving information to personally owned computers, smartphones, or tablets. Ensuring the ability to remotely clear data and content from a device that belongs to a former employee or from a lost device.
- Training employees. Training employees on mobile device policies and effective practices to protect mobile devices.
From: ThinkAdvisor
Complete your profile to continue reading and get FREE access to Treasury & Risk, part of your ALM digital membership.
Your access to unlimited Treasury & Risk content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Thought leadership on regulatory changes, economic trends, corporate success stories, and tactical solutions for treasurers, CFOs, risk managers, controllers, and other finance professionals
- Informative weekly newsletter featuring news, analysis, real-world case studies, and other critical content
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical coverage of the employee benefits and financial advisory markets on our other ALM sites, PropertyCasualty360 and ThinkAdvisor
Already have an account? Sign In Now
*May exclude premium content© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.