Today’s cyber risk landscape has both financial institutions and banking regulators on high alert. According to a survey of bank executives, more than 70% of CEOs say that technology risk is the biggest risk their bank faces, and 64% expect it to increase over the next two years.
Research from the Internal Audit Foundation also confirms that this risk category is top of mind for audit leaders, with cybersecurity ranking as the audit area posing the highest risk and requiring the most audit effort.
A cybersecurity incident is one of the few risk events that can shut down an institution’s operations on the spot. Internal audit executives typically rate the cybersecurity audit as “very high risk” in the audit plan, resulting in annual (if not continuous) audits and heavy scrutiny from examiners.
To summarize cybersecurity from a financial services perspective, we’ll review its definition, objectives, program, and controls, and then discuss the basics of a cybersecurity audit.
Per the FFIEC Information Technology Examination Handbook, “Cybersecurity is the process of protecting consumer and bank information by preventing, detecting, and responding to attacks.” (See: Information Security Booklet, II.A.3(a) Supervision of Cybersecurity Risk)
Cybersecurity objectives focus on protection of digital assets.
As part of a cybersecurity program, institutions should consider management of internal and external threats and vulnerabilities to protect information assets and the supporting infrastructure from technology-based attacks.
Cybersecurity controls include the policies, processes, tools, and personnel for ensuring an organization’s information resources are adequately protected from many types of attacks, detecting when such attacks occur, remediating deficiencies as effectively as possible, and recovering from untoward events.
Cybersecurity-related risks consist of three components: actor, threat, and vulnerability.
To perform a cybersecurity audit, an internal audit team will usually review their institution’s cybersecurity program against a well-respected framework, such as the NIST Cybersecurity Framework (CSF). Examination programs from financial institution regulators, such as the OCC’s Cybersecurity Supervision Work Program, provide internal auditors with guidance on how to structure a cybersecurity audit and map each step to the NIST framework. Regardless of the framework used, however, the protection of digital assets typically includes and addresses five areas: identify, protect, detect, respond, and recover.
To understand the cybersecurity audit in more detail, we’ll review the objective of the audit along with some notable aspects.
The objective of a cybersecurity audit is to assess the design and operating effectiveness of the control environment related to the institution’s cybersecurity program. The scope typically includes a review of available policies and procedures, tests of key controls, and compliance with applicable industry standards and regulatory requirements related to the topics below:
The auditor will also review the status of open issues related to cybersecurity.
There are some notable aspects of a cybersecurity audit that may make it somewhat unique in a financial institution:
Given the high-risk perception of cybersecurity by banking regulators, management teams at financial institutions can be certain that their cybersecurity audit will be heavily scrutinized during the next exam. Chief audit executives will want to allocate adequate resources to the cybersecurity audit and ensure that it’s performed at a frequency that aligns with its risk level.