How to Approach the Demanding 23 NYCRR 500 Regulation
In March 2017, the New York State Department of Financial Services (NYDFS) issued a new regulation, the much discussed 23 NYCRR part 500. Considered to be one of the harshest cybersecurity regulations ever to impact companies, it consists of a new set of standards and requirements for banks, insurance companies, and other financial services organizations. It means that all businesses licensed by the New York DFS and “operating under or required to operate under a license, registration, charter, certificate, permit, accreditation or similar authorization under the Banking Law, the Insurance Law or the Financial Services Law” (with the exemption of small organizations) must comply with the new law. This includes companies such as state-chartered banks, licensed lenders, private bankers, service contract providers, trust and mortgage companies, but also foreign financial institutions and insurance companies conducting business in New York. NY Governor Andrew Cuomo explained that “New York is the financial capital of the world, and it is critical that we do everything in our power to protect consumers and our financial system from the ever increasing threat of cyber-attacks. These strong, first-in-the-nation protections will help ensure this industry has the necessary safeguards in place in order to protect themselves and the New Yorkers they serve from the serious economic harm caused by these devastating cybercrimes.” The new regulation is the latest addition to a comprehensive approach following a series of high-profile data breaches that resulted in losses of hundreds of millions of dollars for individuals as well as US companies as shown below:
The 23 NYCRR part 500 contains regulatory minimum standards to prevent and avoid data breaches. Since the end of August 2017, organizations must have a compliance program and effective policies in place, including having their own Chief Information Security Officer (CISO). These obligations are already in place, although the first reports are only due in February 2018. Let’s have a closer look at the new regulation’s main provisions and how Cymulate can assist. Section 500.02 – Cybersecurity Program Each Covered Entity (defined as “any Person operating under or required to operate under a license, registration, charter, certificate, permit, accreditation or similar authorization under the Banking Law, the Insurance Law or the Financial Services Law”) must develop and maintain a cybersecurity program. This program must be designed to protect the confidentiality, integrity and availability of the Covered Entity’s information systems, and must be based on the Covered Entity’s Risk Assessment. Last but not least, all documentation and information relevant to the program must be made available to the Superintendent of Financial Services upon request. By making the Cymulate solution part of the cybersecurity program, the Covered Entity can perform on-demand cyberattack simulations on a regular basis. The immediate results are provided in a comprehensive report and present a full picture of the Covered Entity’s security posture. Section 500.03 – Cybersecurity Policy Each Covered Entity will implement and maintain a written cybersecurity policy (or policies) that must be approved by the senior management or the Board of Directors of the Covered Entity. This cybersecurity policy must be based on the Risk Assessment and has to contain the policies and procedures for protecting the Covered Entity’s Information Systems as well as the information stored on them. The cybersecurity policy shall be based on the Covered Entity’s Risk Assessment and will address various areas where Cymulate can assist, such as:
Date | Victim | Breach | Fallout |
November 2013 | Target Corp. | 41 million Target customers’ payment card accounts were breached by criminals using the credentials of 61 million Target customers that were stolen from a third-party vendor | · $18.5 million settlement in 47 states in 2017 · $10 million class-action lawsuit settlement in 2015 · Payments of up to $10,000 per customer who suffered proven losses from the data breach |
April – September 2014 | Home Depot Inc. | Data breach affected more than 50 million cardholders that used the Company’s self-checkout terminals in its US and Canadian stores that were compromised by custom-built malware that accessed payment card information | · $27 million settlement with banks in 2017 · $15.3 million in legal fees and $710,000 in expenses to the banks’ attorneys · $19.5 million to customers harmed by the hack · $14.5 million settlement with MasterCard and Visa |
2015 | Anthem Inc., the largest US health insurance company | The personal information of 79 million individuals was compromised by attackers who gained unauthorized access to Anthem’s IT system | · A settlement of $115 million for more than 100 lawsuits was agreed upon in 2017 |
May – July 2017 | Equifax, one of the three largest credit reporting agencies in the US | 143 million US consumers were compromised by criminals exploited a US website application vulnerability to gain access to files | · Inquiries from the Consumer Financial Protection Bureau, the Federal Trade Commission, the House Financial Services Committee, the Senate Finance Committee, New York’s Attorney General · The CEO, CIO and CISO of Equifax were forced to resign · Lawsuits, including from the State of Massachusetts · New York Department of Financial Services (DFS) issued a new regulation that Equifax and other credit reporting agencies must register with the NYDFS, and must comply with the NYCRR 500 |
August 2017 | Sonic Drive-In, a US fast-food chain with 3,600 locations | Malware attack at some of its drive-in outlets resulted in millions of stolen credit card credentials | · Sonic’s shares fell 24.4 % in the two months after the breach · Sonic will offer affected customers free identity theft protection |
- Using the Cymulate platform to test systems and network security;
- Running scheduled Cymulate simulations as part of systems and network monitoring;
- Letting the Cymulate platform validate the security posture for risk assessment;
- Leveraging Cymulate’s test reports for formulating and fine-tuning incident response;
- Running various Cymulate modules (such as Cymulate’s Web Application Firewall Assessment) to assist with systems and application development and quality assurance.
Featured Resources
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe