ISSN: 2754-6659 | Open Access

Journal of Artificial Intelligence & Cloud Computing

Role of Information Security (Including Cyber security) Risk Managers in Financial services and the Crucial Role they Play

Author(s): Pranith Shetty

Abstract

Financial Services sector are a very critical part of nation’s infrastructure, cyberattacks on this sector could potentially have devastating consequences on the economy. Cyber and information security landscape are continuously evolving thus putting a lot of pressure on the systems responsible for operations. System and business owners are also cornered from all directions in terms of Audits, Assessments and compliance matters, thus making it difficult to deliver on business objectives, time and resourcing constraints have also played a contributing role. Security field has varied staff members with different skills and area of expertise, Information security management is one such skillset that needs to be housed in every financial firm and other sectors. Information Security Managers have the expertise to bridge the gap between not only Systems owners and Security experts, Compliance staff but also with Business. They can work in advisory capacity, guiding security risks through the Risk management Lifecyle towards mitigation, reporting becomes comparatively easier with them in the fold. They can also quarterback or in other words run point on Compliance related initiatives. This article helps understand the Information (cyber) security landscape in the financial services sector and the role information security managers can play to help relieve the burden on system owners and security SMEs (Subject Matter experts) to help balance the scales in business’s favor.

Introduction

Overview of Financial Services Sector

Financial Services sector are a very vital component of our nation’s critical infrastructure. Large scale cyberattacks, power outages and natural calamities like flood, earthquakes are the potential risks to this sector [1]. Financial services includes investment banks, insurance firms and other critical financial utilities. Institutions like big banks , retail, credit unions also fold into this sector by definition. As we did experience in 2008, a crisis in this sector caused a widespread collapse across the globe so it’s very important to protect this sector from the various Cybersecurity threats and Information security related risks.

Role of Information Security Managers

Information Security Managers are primarily responsible for the smooth functioning of the Information Security program, system, governance etc [2]. They are also alternatively called as Information security officers, Cybersecurity analysts, Security specialists and so on. The role description depends on the hiring organization’s needs, functions, org structure etc.

Depending on the line of defense meaning if the officer is in 1 st line working with engineers, the portfolio of work would differ as compared to the officer in 2nd line working on operational risks and governance related functions but overall Information Security managers are in consulting / advisory capacity that requires them to advise engineers on risk security remediations, they also advise leadership/senior management on risks that cannot be remediated and need to be accepted. They recommend all sorts of measures proactive, reactive that act in the favor of the firm.

Information Security vs Cyber Security

NIST (National Institute of Standards and Technology) recognizes both these areas as different in terms of domains, there is a slight variance as described here, but in reality Cybersecurity is a subset of Information security as described below, CIA tenets here means Confidentiality, Integrity and Availability which form the basis of Information security as a domain, Cybersecurity on the other hand is narrowed to the use of computer systems, cell phones etc.

So in essence an Information Security Manager would also be responsible for Cybersecurity relates issues and risks, in some instances firms hire exclusively for Cybersecurity roles.

img

Rationale for this Study

Stakeholders, Engineers, Business owners and system owners in financial services are from varied backgrounds, some are application owners while some are system owners, database admins, as a result they need a staff member; who has the background and expertise in dealing with information security and risks, this member can work with the potential risk owners in ensuring the findings from audit teams or assessment teams make sense. There are instances where audit teams would create findings outside the scope of Audit. There are findings that are attributed to target dates that are very close, without proper estimations. The system owners out of obligation accept those target dates and eventually end up with misplaced priorities. They could have worked on building products or improving processes to drive business as opposed to working on remediations that could have had an extended date based on the risk rating or could have been a finding beyond the scope of audit unfairly tagged. There are cases where Business / System owners have to attend multiple assessments as part of the accountable team, they could easily delegate these meetings to their information security managers; who can run point and work with these owners on streamlining Information Security programs.

Literature Review

This government website explains in detail the various core competencies that the Information Security Manager brings onto the table and indirectly helping us understand the positives of this role [2].

This thought leadership article from Safebreach, a consulting firm helps us understand the strain that Security and It teams are in at the moment to ensure secure cybersecurity defenses [3].

There are various articles that discuss the need to have cybersecurity controls for protecting financial and customer data [4,5].

Importance of Information Security/Cyber security in Financial Services Impact

There are several reasons why financial services sector should take cybersecurity seriously, since these firms are very important and classified as critical national infrastructure a threat to these firms can have a devastating impact across different sectors and can span across nations globally [4,6]. Some of the few repercussions of not having cybersecurity measures in place are: Financial Impact: Any data breach resulting from insider or external attack could result in loss of digitized transactions, impacting annual revenue, profits, financial statements.

Reputational Impact: As a result of the breach, faith in the institutions will be questioned by both existing and potential customers.

Regulatory Impact: Failure to safeguard public interests, data etc., additionally noncompliance to the regulatory laws could result in fines and affect the overall operations of the firm.

Hence it’s important to ensure necessary Information Security controls for Protection of customer data, Prevention of financial fraud, Compliance with regulatory requirements and protection of intellectual property.

Firms are investing in Cybersecurity or will continue to invest because the number of threats and attacks are only going to increase and evolve, being proactive will eventually pay its benefits, Investing now can save the firms approx. 4.45 million$, using AI (Artificial Intelligence) along with cybersecurity measures would result in more savings and improve the risk and control posture twofold [7].

Firms with a robust incident response framework saved an average of 2 million $.

Along with investing in technologies and framework, it’s also important for firms to assess themselves against industry wide compliance frameworks and regulations such as GDPR, FINRA etc. since noncompliance may result in extensive fines and reputational impact along with loss of customer faith and trust.

Below are some statistics and visuals that draw comparisons between different sectors in financial services and within a financial firm, where is the overall cybersecurity budget being diverted to? [8].

img

img

Method

In any firm including financial services, there are several risk identification channels such as

RCSA

Risk control self-assessments, this is a self-identification of risks process that the control owners, systems owners, risk owners have to attest to.

TCA

Technology control assessments which checks for the maturity of system controls and ensures there are no control gaps, this is operated by the operational risk team in 2nd line of defense. There are some assessments operating out of second line, mainly by operational risk teams to ensure governance, and then we have the internal audit teams in 3rd line of defense, presenting their findings to the Board, there is also the 4th line that is the regulatory bodies like SEC (Securities and Exchange Commission), FINRA (Financial Industry Regulatory Authority) with their adhoc audits to ensure compliance with the overarching regulations in the financial space.

Apart from the assessments, there is business as usual work on the security side with security architecture reviews for any new application or system being designed, there are vulnerability management and incident management programs that generate portfolio of work on the risk matters. Information security managers can streamline all of these findings, controls gaps, potential risk items through governance forums. They actively work with risk owners and accountable executives to facilitate these discussions. Their opinion matters the most in consulting capacity during these risk discussions. These governance forums act as Steering committees which facilitate Risk response from Senior management keeping in mind the organization context of Risk appetite and Risk tolerance [9,10].

There is a very simplistic structure of governance forums in financial services, critical/high risks are guided through all governance forums across first and second line of defense and make it to the Senior leadership, while moderates and lows make it through first line and a few forums in second line for visibility and insight of the operational risk management teams. Third line of defense also called as the Internal Audit teams don’t organize governance forums since they are an independent assessing body within the firm.

Information Security Managers also leverage various dashboards for risk reporting purposes and actively contribute to the continuous monitoring exercises.

Discussion and Extended Use Cases

Role of information Security managers extends to the entirety of financial services from big banks to startups to investment firms, information security managers can work with CISO and teams in improving the risk posture. They can interact with the business teams, legal counterparts and security architects. Information Security and risk managers can work well with regulators over the course of Audits to understand context. They are consulting and advisory capacity which helps stakeholders and systems owners to get perspective and insight into the holistic risk posture. These positions work well in technology firms too for Risk reporting purposes and having technical conversations with security architects on control implementations.

Conclusion

Role of an Information Security manager is very crucial in not just financial firms but in any line of business, since, they have the required expertise to tackle compliance situations but at the same the technical knowledge to work with security subject matter experts and system owners, thus bridging the gap between various stakeholders. As the threat landscape continues to evolve and there is more budget spend in areas of security, it’s important to have resources at every level and with varied skill sets to deliver on that vision of secure operating environment. Information security managers can step in reduce the compliance and interface with other security teams to help system owners understand a holistic risk picture so that they don’t end up in a complex world of building security controls, right thing to do is balancing business objectives with security to deliver on leadership’s vision [11,12].

References

  1. (2023) Financial Services Sector. Cybersecurity and Infrastructure Security Agency CISA https://www.cisa.gov/ topics/critical-infrastructure-security-and-resilience/criticalinfrastructure-sectors/financial-services-sector.
  2. Information Systems Security Manager. Cybersecurity and Infrastructure Security Agency. CISA https://www.cisa.gov/ careers/work-rolesinformation-systems-security-manager.
  3. (2022) Why Security & IT Teams in the Financial Industry Are Under Enormous Strain. SafeBreach https://www.safebreach. com/blog/security-teams-financial-industry/.
  4. (2023) The Importance of Cybersecurity in the Financial Industry. AEC-Council University https://www.eccu.edu/ blog/cybersecurity/why-is-cyber-security-important-in-thefinancial-industry/.
  5. Galarita B (2022) Information Security vs. Cybersecurity: Explaining the Difference. Forbes Advisor https://www. forbes.com/advisor/education/information-security-vs-cybersecurity/.
  6. (2022) Why is Cybersecurity Important in the Financial Industry? Computronix https://computronixusa.com/whyis-cybersecurity-important-in-the-financial-industry/.
  7. Bonderud D (2023) Cost of a data breach 2023: Financial industry impacts. Security Intelligence https:// securityintelligence.com/articles/cost-of-a-data-breach-2023- financial-industry/.
  8. Cybersecurity insights (2023) Budgets and benchmarks for financial services institutions. Deloitte https://www.deloitte. com/content/dam/assets-shared/docs/cybersecurity-insights2023-budgets-benchmarks-financial-services-institutions.pdf.
  9. (2022) Risk Appetite - Glossary. NIST https://csrc.nist.gov/ glossary/term/Risk_Appetite.
  10. (2022) Risk Tolerance - Glossary. NIST https://csrc.nist.gov/ glossary/term/risk_tolerance
  11. Financial Services Cybersecurity. Imperva https://www. imperva.com/learn/data-security/financial-servicescybersecurity/#:~:text=Cybersecurity%20for%20 financial%20services%20is.
  12. Bowcut S (2021) Cybersecurity in the Financial Industry. Cybersecurity Guide https://cybersecurityguide.org/ industries/financial/.
View PDF