Sheltered Harbor protects public confidence in the financial system if a catastrophic event like a cyber attack causes your critical systems,

Similar documents
Business Services Resilience and Restoration. Financial Services Sector Preparation for an Extreme Event

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Table of Contents. Sample

Symantec Business Continuity Solutions for Operational Risk Management

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

Business Continuity Management

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Copyright 2016 EMC Corporation. All rights reserved.

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

locuz.com SOC Services

Cyber Resilience. Think18. Felicity March IBM Corporation

2017 Annual Meeting of Members and Board of Directors Meeting

Accelerate Your Enterprise Private Cloud Initiative

Sage Data Security Services Directory

Cyber Threat Landscape April 2013

Standing Together for Financial Industry Resilience Quantum Dawn IV after-action report June 2018

Emerging Issues: Cybersecurity. Directors College 2015

DHS Cybersecurity: Services for State and Local Officials. February 2017

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

POSITION DESCRIPTION

National Policy and Guiding Principles

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

EU General Data Protection Regulation (GDPR) Achieving compliance

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

ISAO SO Product Outline

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Developing a Holistic Strategy To Achieve Community Health Resilience

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

Cyber Resiliency. Felicity March. May 2018

Business Continuity Planning

Cybersecurity and Data Protection Developments

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

M&A Cyber Security Due Diligence

Clarity on Cyber Security. Media conference 29 May 2018

Global Resilience Federation Trust. Collaboration. Community. Cindy Donaldson President, Global Resilience Federation October 2017

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Background FAST FACTS

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Applying Mitigation. to Build Resilient Communities

13967/16 MK/mj 1 DG D 2B

Cybersecurity. Securely enabling transformation and change

FOR FINANCIAL SERVICES ORGANIZATIONS

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

IT Expert (Enterprise Network and Infrastructure Architect)

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

How Secure is Blockchain? June 6 th, 2017

Disaster recovery strategic planning: How achievable will it be?

Critical Infrastructure Resilience

New Zealand National Cyber Security Centre Incident Summary

Kroll Ontrack VMware Forum. Survey and Report

Canada Life Cyber Security Statement 2018

Cybersecurity and Examinations

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

RESOLUTION 130 (REV. BUSAN, 2014)

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Veritas Technology Ecosystem (VTE)

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

Cyber resilience, information security and operational continuity

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Software, Security, and Resiliency. Paul Nielsen SEI Director and CEO

COPE-ing with Cyber Risk Exposures

Business Continuity Plan (BCP) in Case of an Emergency

Defense in Depth. Constructing Your Walls for Your Enterprise. Mike D Arezzo Director of Security April 21, 2016

Back to the Future Cyber Security

CA Security Management

Protection Levels, Holistic Approach. ISA-99 WG 3 TG 3 Protection Levels

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Scope Cyber Attack Task Force (CATF)

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

Professional Services for Cloud Management Solutions

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

A Guide to Ensuring Security and Resiliency

ISACA 2017 OVERVIEW. 3º Fórum IBGP de Tecnologias da Informação. Paulo Henrique Abreu Moreira. Brasília Chapter Associate & CSX Director 08/11/2017

CLOUD COMPUTING READINESS CHECKLIST

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Disaster Recovery and Business Continuity

7 th BICSI Southeast Asia Conference 2009 Building the Next Generation Broadband Network

Florida Board of Governors General Office Legislative Budget Request

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

CYBER RESILIENCE & INCIDENT RESPONSE

Data Sheet The PCI DSS

Cybersecurity and the Board of Directors

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

Defending Our Digital Density.

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

SWIFT Response to the Committee on Payments and Market Infrastructures discussion note:

Transcription:

Sheltered Harbor protects public confidence in the financial system if a catastrophic event like a cyber attack causes your critical systems, including your backups, to fail.

Who We Are Sheltered Harbor is a not-for-profit, industry-led initiative that was developed to protect customers, institutions and public confidence in the financial system itself in case of a catastrophic event like a cyber attack. The Sheltered Harbor standard combines secure data vaulting with a comprehensive resiliency plan. In a worst-case scenario, activating Sheltered Harbor provides your customers timely access to their funds. The standard itself was developed by hundreds of subject matter experts drawn from the ranks of its participants. By joining and actively participating in Sheltered Harbor working groups and forums, you can directly influence the evolution of this important initiative. Sheltered Harbor is structured as a subsidiary of FS-ISAC (Financial Services Information Sharing and Analysis Center) with an independent board of directors. Its primary functions are to establish and evolve the standard, promote adoption by the industry, support implementation, and ensure adherence. Participation is open to financial institutions of all sizes including banks, credit unions, brokerages, asset managers, industry associations and service providers.

Resiliency When All Else Fails In today s connected world, cyber resilience is critical to any financial institution s survival. Cyber threats are unpredictable, ever changing, and evolving from being mainly financially motivated to include political motivations, sometimes by highly sophisticated state actors. A paralyzing attack that prevents customers from accessing their accounts could not only destroy an institution, it could cause panic that infects the entire financial system. How can you prepare for data destruction events like these? Sheltered Harbor is your backup of last resort for an attack that causes all your critical systems including your existing backups to fail.

How It Works There are two critical elements: data vaulting and resiliency planning. Vaulting your data each day is the only way to ensure you have the data to restore should you activate the Sheltered Harbor Resiliency Plan in case of a devastating attack. After you join Sheltered Harbor, you ll follow the process shown below for implementing the standards. Data Vault Back up critical customer account data each night in the Sheltered Harbor standard format, either managing your own vault or using our community of participating service providers. The data vault must be encrypted, unchangeable and completely separated from the rest of your infrastructure, including all backups. Lay the groundwork for developing your Sheltered Harbor Resiliency Plan. Resiliency Plan Prepare and test business and technical processes to be activated in the case of a catastrophic event; where all other options to restore critical systems including backups have failed. Designate a restoration platform so that if the resiliency plan is activated, data can be recovered from the vault to restore customer funds access as quickly as possible while you work to get back online. Initiation and Planning Ensure all program elements are in place: team, budgets, tracking and reporting mechanisms. Data Vaulting Certification Resiliency Plan Certification

Why Sheltered Harbor? Built collaboratively by hundreds of the top subject matter experts in the financial industry. The industry-developed standard for customer data protection and recovery of access to funds when critical systems fail. Broad industry backing includes major industry associations, service providers, advisory and assurance firms, and regulator support. Participating institutions already hold the majority of U.S. deposit accounts and brokerage client assets. To protect the entire industry, 100% participation is optimal. Participation is low-cost and scaled to institution size and scope. At all times, participants maintain control of their own customer data, plans and processes. Tools and Resources Guides, roadmaps, forums, and training Reference architectures and templates Technology solutions such as encryption software (additional fees may apply) Alliance partners to help build the right plan for your institution (additional fees may apply) Join today at /Join

Telephone: +1 (347) 797-1230 Email: info@shelteredharbor.org