This slideshow was updated at 1:28 P.M. on Oct. 30, 2018.
Carlos Molina, senior consultant in risk and compliance solutions at CUNA Mutual Group
Cybercrime is predicted to cost the world
The rate of technological advancement will continue to place more focus on skills and resources of credit union employees, including cybersecurity personnel. The impact and disruption caused by emerging technologies emphasizes the need to recruit and cultivate talented people to help mitigate the constant emergence of risk.
Credit unions need to be creative in their recruitment strategies to confront this shortage of talent head on. Executive leadership, human resource departments and existing information security employees should create a collaborative, compelling approach toward not only attracting top talent, but also retention and cultivation from within.
Historically, candidates for cybersecurity positions were judged solely on formal degrees, certifications and definitive experience timelines. While all these factors are important, they do not always translate into a good fit for a credit union. Assessing a candidate’s soft skills such as commitment to personal development, an understanding for analytics and process, and ability to collaborate may reveal more about that individual’s potential to excel within the role.
Finally, credit unions should not ignore their current employee base when searching for cybersecurity talent. Leveraging existing skillsets, interest in the subject matter, and an understanding of the credit unions culture and core business objectives may uncover an employee’s willingness to seek a new career path.
Julie Esser, chief engagement officer at CULedger
As credit unions explore authentication as a cybersecurity initiative, one of the most important areas to focus is digital identity, since confirming a member’s identity is the first step of any transaction. Distributed ledger technology (DLT), commonly known as blockchain, can verify identity through digital channels using a self-sovereign digital identity through the consumer’s financial institution. This use of DLT gives individual members control over their personal identifiable information and can create a truly secure and private flow of information, eliminating the current siloed identity method.
A primary advantage of DLT is its inoperability; information or transactions conducted through a ledger cannot be changed. The ledger is a database that is spread across several nodes or computing devices, each replicating and saving an identical copy of the ledger, updating independently. In order to corrupt a ledger, hackers would have to corrupt more than half of its nodes simultaneously, which makes systems based in DLT unattractive targets for fraudsters. Credit unions should look into using private ledgers particularly, since these are secure networks to use for sensitive transactions. Distributed ledgers based on permissioned access are fundamentally different than permission-less or proof-of-work ledgers, such as the ledger supporting Bitcoin. The security, low cost, inoperability and convenience make DLT a valuable technology for financial institutions to use when developing digital identity solutions.
Keaton Tanzer, business development manager at Rivial Data Security
As we’ve seen with every cyber criminal trend, attackers generally select their targets based on where the most sensitive data is. With so much critical data hosted by AWS, I can imagine we’re going to see heightened attack levels against these servers – both in quantity and sophistication.
Luckily, there’s a lot credit unions can do to ensure Amazon is taking the proper measures to keep their data secure.
· It starts with having a good vendor management program in place. As you would with any other vendor, request a SOC report and have a qualified security personnel member review it for your organization. Make sure Amazon and other vendors are holding up their end of security.
· Don’t assume security is managed by Amazon and make sure you understand your institution’s responsibilities for security as an AWS customer. For example, MFA and encryption are not turned on by default. These are protections you, the customer, are responsible for enabling.
· Ensure AWS accounts are managed securely. Concepts like role-based access, least privilege, account reviews, all still apply in AWS.
· Turn on monitoring and event logging, using services like CloudTrail. Enabling logging for S3 buckets, file validation, etc across geographic regions will give you a fighting chance at identifying nefarious activity.
· Lastly, you not only want to make sure your data is safe, but available whenever you need it. Use SLAs to ensure there are minimal service disruptions. This way, if there is a disaster, your data is not unavailable for long.
Kimberly Little Sutherland, senior director, fraud and identity management strategy, LexisNexis Risk Solutions
Vijay Pullur, CEO of ThumbSignIn
The good news is new technology innovations based on behavioral analysis, machine learning, AI and biometric security gives them hope for achieving highest levels of security under constrained budgets. The key to successfully preventing future attacks is a three-step process:
1. Categorizing threats originating from – network and infrastructure, third-party software and custom developed applications, compromise in employee laptops and devices, and breaches due to poor password practices of consumers. Conducting audits and assessment of internal systems and process with respect to each of the above and creating a readiness scorecard
2. Creating a stepwise improvement roadmap starting from weakest to strongest system based on the scorecard
3. Adopting newer intelligent technologies and deploying them in stages to prevent attacks pro-actively
The cyber security threats looming on credit unions is more than ever now. Pro-actively adopting new technology innovations is a key to success in preventing these attacks.
Frances Zelazny, chief strategy and marketing officer at BioCatch
Derek Laczniak, director of cyber liability at M3 Insurance Solutions
Data security is governed by individual states through legislation that has been passed by all 50 states. State laws have been popping up in states dating back to 2003 when California passed the initial data security law. Since then, all remaining 49 states have passed similar laws with varying degrees of governance and oversight. The one common component of these state laws is that the majority contain a requirement that data breaches by organizations, both public and private, must notify the state’s attorney general in the event of a data breach. Further, the laws all apply to affected individuals within that state, without any concern for where the organization that suffered the data breach is actually located. These laws provide almost exclusive regulatory authority to the state’s attorney general in investigating these matters and grant them the ability to fine and penalize as a result of these investigations.
In the last three years there has been an alarming amount of notifications taken up by states’ attorneys general investigating reports of data breaches. Landmark settlements with attorneys general in some of the larger more public data breaches (such as Target, Yahoo and Equifax) suggest that state’s attorney generals are becoming increasingly active in this area and looking to enforce the regulatory authority they have been granted.
Giles Ring, cybersecurity operations manager at Virginia Credit Union
Tim Mielak, chief information security officer at Michigan State University Federal Credit Union
Credit unions may face an uptick in the frequency and amount of credit fraud using synthetic identities in the near future. Traditional point-of-sale fraud committed with stolen credit card information is effective, but can have a high failure rate because of modern anti-fraud capabilities. Account services and loans using synthetic identities, constructed with real and typically stolen social security numbers, can be more difficult to detect and result in higher losses for credit unions.
Wearable payment options and voice-controlled personal assistant services will likely increase the public’s comfort with and general usage of IoT devices. The primary risk with IoT is weak default security. If the adoption of these devices outpaces the maturation of IoT security measures, the value of developing IoT malware for purposes such as account takeover and personal data theft will be high enough to make it attractive to financially motivated threat actors. As a result, credit unions may see an uptick in IoT-related fraud and data theft.
With new legislation beginning to emerge in the United States similar to the European Union’s Global Data Protection Regulation, credit unions may be required to provide right-of-access services to third parties that do not have established or regulated cybersecurity programs. As a result, there may be an increased risk of data loss through these inexperienced third parties and their services.
Alissa Knight, senior analyst at Aite Group
As credit unions secure the other more traditional attack vectors, hackers are increasingly shifting their focus to exploitation of poorly secured APIs – many of which don’t even require authentication. That was the case in the compromise of Panera, which resulted in a breach impacting more than 37 million payment cards.
Exploitation of APIs typically affect:
- Availability through denial-of-service attacks as a result of developers failing to sanitize user input
- Malicious code injection using JSON web tokens
- Data leaks or man-in-the-middle (MiTM) attacks as a result of no encryption being used between the API and server
- Session cookie hijacking