The financial industry has better cybersecurity than most others. But the audience at the Boston Fed’s 2016 Cybersecurity Conference Monday heard that better is not enough, since cyber criminals are getting better all the time too Credit: Thinkstock Most security experts would agree with Kenneth Montgomery, first vice president and COO of the Federal Reserve Bank of Boston, that the financial industry is, “the most regulated and the most prepared” of any to deal with constantly increasing and evolving cyber attacks.But Montgomery, speaking at the Boston Fed’s 2016 Cybersecurity Conference on Monday, agreed that the scale and sophistication of the attacks means that no industry is bulletproof. As evidence, he cited the Symantec 2014 threat report that 1 million new pieces of malware were being created daily.Getting a bit closer to the bulletproof ideal was the focus of the annual conference, and Montgomery said one of the Fed’s efforts to do that is a threat-sharing group that meets once a month.As he and several other speakers noted, the stakes are high, because although the financial sector’s security is better than other industries (particularly retail and health care), a major breach could have a catastrophic impact. Anjan Mukherjee, counselor to the secretary and deputy assistant secretary for financial institutions policy at the U.S. Treasury department, noted that the financial sector is considered critical infrastructure, for good reason.[ MORE FROM THE CONFERENCE: Blindsided by the IoT? ] The Lehman Brothers collapse in 2008 demonstrated that, “when a global bank fails, it produces shock waves across the world, and creates uncertainty and volatility,” he said, but added that a “significant software problem” at the Bank of New York more than 30 years ago, in November 1985, also disrupted security trades.“In one case it was insolvency, in the other a technical glitch,” he said. “But they both highlight the inherent connectivity of the financial markets.”So a major cyber attack that brought down a major institution even temporarily would create, “the very real risk of transmitting one institution’s stress to the rest of the market,” he said.Peter Kuper, a partner at the high-tech venture capital firm In-Q-TelPeter Kuper, a partner at the high-tech venture capital firm In-Q-Tel, agreed. In a talk on the “unintended consequences” of a connected, global online economy, he noted that, “everything of value is already online in one form or another. So cybercrime is only going to increase – that’s where the money is.”Don Anderson, senior vice president and CIO at the Boston Fed, confirmed that. He said populations that have been traditionally “underbanked” are now gaining access to it through mobile technology. “Fifty-seven percent have access to a smartphone, compared to 44% of of the general population,” he said. Mukherjee said the goal for banks and other financial institutions should be, “to reduce the probability of an event happening, and if it does, minimize the cost,” through best practices.” Those include:Use the NIST (National Institute of Standards and Technology) framework. “It is not a technical document,” he said. “It is a powerful tool that provides a common lexicon to facilitate communication within organizations and with outside third parties.”Know and catalog all vendors that have access to your systems and data.Make sure those third parties have appropriate cyber security practices, and conduct ongoing monitoring to make sure of it.Join FS-ISAC (Financial Services Information Sharing and Analysis Center). “Be mindful of privacy, but this is a group with 7,000 members, and it leverages knowledge of threat indicators,” he said.Practice response and recovery, to contain and mitigate. “Have an internal team and coordinate with external teams. Have a playbook and exercise it regularly,” he said.Have backup plans and work-arounds, to make critical payments and deliveries manually if necessary.Kuper warned, however, that technology and systems will not be enough, since the human element remains the weakest link in the security chain. “It’s about stopping stupid,” he said, “since 77% of intrusions are through email. That’s the attack surface.”Kuper said situations like an employee being offered $20,000 to put a malicious USB thumb drive into a system, “happen all the time. We have to deal with insider abuse.”Anderson acknowledged that email attacks have gotten much better. He said in one case, the Fed’s IT team sent out “test” emails to see if employees, including executives, would be fooled by it. “It looked legitimate,” he said, “and if I hadn’t been in a hurry, I might have clicked on it.” Anderson said the bottom line is that, “the bad guys have technology too. Now is the time to disrupt ourselves.” Related content news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Network Security Security news New Trojan ZenRAT masquerades as Bitwarden password manager A report by Proofpoint identifies the new Trojan as undocumented and possessing information-stealing capabilities. By Lucian Constantin Sep 28, 2023 4 mins Cyberattacks Hacking Data and Information Security news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Data and Information Security Security Practices news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe