@DXWorldExpo Authors: Yeshim Deniz, Zakia Bouachraoui, Pat Romanski, Carmen Gonzalez, Elizabeth White

Blog Feed Post

Group in position to know warns of significant cyber risk to our financial systems


beyondthehorizonIf you are in the financial industry of course you know about the DTCC. But if you are from outside the industry you should also be tracking these guys. They can inform your strategic technology direction. More about why is in this post.

The DTCC is the Depository Trust and Clearing Corporation, a group that operates to close the books and clear transactions throughout the finance world. They touch most equities, bonds (corporate and municipal), mortgage backed securities, money market funds and many derivatives of these instruments. They process mutual funds and insurance transactions. They are a core piece of our financial system and the amount of information they process, daily, is staggering.

They have also long been community players. I first worked with them when the concept of ISACs were established. They remain engaged in multiple collegial community activities. Clearly they know that it takes a team to track and mitigate the current cyber threats.

The DTCC has just published a paper you should be aware of. The paper is titled Beyond the Horizon: A White Paper to the Industry on Systemic Risk, In it the DTCC identifies a number of emerging trends that could  impact the industry’s ability to protect against new and unidentified threats to the financial system.

There are many risks examined. Cyber security is  key among them. From the report:

Cyber Security: This issue has emerged as arguably the top systemic threat, facing not only the global financial  markets and associated infrastructures, but also world governments and military establishments. DTCC places an extremely high organizational focus on mitigating this issue and our Chief Information Security Officer’s strong industry engagement and leadership underscore that commitment. DTCC has robust internal cyber security policies and procedures and actively participates in industry-coordinated exercises aimed at increasing resiliency against cyber attacks. Despite all of these efforts and given the diverse and global nature of cyber attacks, DTCC does not expect this risk to dissipate significantly in the near term.

From the DTCC perspective, they see key cyber security threats as:

Risk of a Distributed Denial of Service (DDoS) attack: Objective: To cause market disruption by preventing business transactions (e.g., affect clearance, settlement and similar core functions).
Risk of an attack against systems containing transaction records: Objective: To cause market disruption by deleting, modifying or corrupting books and records of the  financial industry.
Risk of disclosure of restricted, confidential, Material Non-Public Information data via compromise of internal systems: Objective: To cause loss of trust in the U.S. financial systems, insider trading and other forms of market manipulation.

More context from the report:

DDoS Attacks: In the last 12 months, DDoS attacks against financial institutions have dramatically increased. DDoS attacks typically attempt to flood the bandwidth and network connectivity between a financial institution and the broader Internet. Such an attack is carried out by sending a large volume of requests from compromised machines to the institution’s website. Prior to last year, these attacks were launched from infected desktops and home personal computers. Recently, these attacks have been launched from compromised servers (up to ~6000 servers), which have significantly more capacity and outgoing bandwidth. For example, prior to 2012, the peak volumes of DDoS attacks against financial institutions were approximately one to two gigabits per second (Gbps). Recent attacks have peaked at close to 150 Gbps, or approximately 15 times the provisioned bandwidth at a typical financial institution. The attacks have been unrelenting and are getting more  sophisticated by the day. Financial institutions are spending more and more of their resources in attempts to  ward off these attacks.

Advanced Persistent threats (APT): APT attacks are stealthier than DDoS attacks because APT attacks are not public. Their objective is not to disrupt Internet-facing communications, but rather to infiltrate an institution’s systems and monitor or ex-filtrate data to a server outside the firm. APT attacks are very difficult to detect, unlike  DDoS attacks, which are visible and often publicized prior to an attack. In an APT attack the infected malware could be sent by a variety of means including e-mail attachments or compromised websites. The attackers often use social networking tools to perform reconnaissance and identify key employees at a firm. The attackers then compromise the machines of those individuals, and propagate horizontally and vertically within the target organization.

There are broad recommendations in the report that deserve your study. They are recommendations by thinkers who have lived these challenges and know what they are talking about.

A concluding DTCC thought regarding cyber attacks:

DTCC expects cyber attacks to escalate and become more sophisticated in the future. Attackers benefit from their anonymity and lack of attribution as well as their existence outside U.S. and E.U. jurisdictional boundaries, all of which minimize the probability of prosecution. Due to the asymmetric nature of the  Internet, it is very inexpensive for an attacker to launch an attack and very expensive for the defender to defend against those attacks. Protection from these risks can be enhanced through closer information sharing, increased real-time exchange of threat intelligence and stronger prosecution across international boundaries. DTCC will engage the industry to determine actions that can be taken jointly to reduce the risk. Strategies such as leveraging DTCC’s private network to communicate in case of network disruption and enabling the industry’s small and medium participants to utilize the private network are under consideration.

For more on these and other risks see: Beyond the Horizon: A White Paper to the Industry on Systemic Risk

When it comes to technologies that can help mitigate these threats, in my opinion, full spectrum, defense in depth is the way to go to (protect what you can at the national level and work to ensure rule of law internationally, but work to enhance ISP quality and ability to prevent, defend your own networks, protect servers and devices, and understand your people are your first line of defense. Also understand that the bad guys will get in so you must be able to detect, respond and recover).  As you look at your full spectrum defense be sure to evaluate:

  • Centripetal Networks: Enabling telecom providers to deliver “Clean Internet” and providing the financial industry with new means to keep cyber criminals out of networks.
  • Invincea: Providing enhanced endpoint protection and shipping in millions of devices. Protection at the first line of defense, mitigating threats due to user error and deceptive malware.
  • Triumfant: Discover when any PC goes out of its normal state and act on your policy to return it to state.
  • Fixmo: Bringing security and risk management to every mobile device. Protect your enterprise data and manage your devices.
  • Recorded Future: Leverage the power of the Internet to track cyber threats and vulnerabilities and achieve quicker shared situational awareness.
  • Cloudera: Providing enhanced abilities to operate over all data to understand, including fast analysis capabilities relevant to the cyber threat.


Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

DXWorldEXPO Digital Transformation Stories
Your applications have evolved, your computing needs are changing, and your servers have become more and more dense. But your data center hasn't changed so you can't get the benefits of cheaper, better, smaller, faster... until now. Colovore is Silicon Valley's premier provider of high-density colocation solutions that are a perfect fit for companies operating modern, high-performance hardware. No other Bay Area colo provider can match our density, operating efficiency, and ease of scalability.
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
AI and machine learning disruption for Enterprises started happening in the areas such as IT operations management (ITOPs) and Cloud management and SaaS apps. In 2019 CIOs will see disruptive solutions for Cloud & Devops, AI/ML driven IT Ops and Cloud Ops. Customers want AI-driven multi-cloud operations for monitoring, detection, prevention of disruptions. Disruptions cause revenue loss, unhappy users, impacts brand reputation etc.
Serverless applications increase developer productivity and time to market, by freeing engineers from spending time on infrastructure provisioning, configuration and management. Serverless also simplifies Operations and reduces cost - as the Kubernetes container infrastructure required to run these applications is automatically spun up and scaled precisely with the workload, to optimally handle all runtime requests. Recent advances in open source technology now allow organizations to run Serv...
As the fourth industrial revolution continues to march forward, key questions remain related to the protection of software, cloud, AI, and automation intellectual property. Recent developments in Supreme Court and lower court case law will be reviewed to explain the intricacies of what inventions are eligible for patent protection, how copyright law may be used to protect application programming interfaces (APIs), and the extent to which trademark and trade secret law may have expanded relev...
Cloud computing, big data and AI provide a new impetus and urgency to traditional enterprises to become digitally transformed businesses as they face disruption from new players who leverage technology to foster new business models. Traditionally, enterprises focused on digitizing processes and transactions. The incumbents can also be disruptors by leveraging AI for data-driven insights and innovate at scale on Cloud platform. They need to uncover the power of ERP/SAP using Cloud, AI and Big dat...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...