AUTHORITYID | CHAMBER | TYPE | COMMITTEENAME |
---|---|---|---|
ssbk00 | S | S | Committee on Banking, Housing, and Urban Affairs |
[Senate Hearing 115-307] [From the U.S. Government Publishing Office] S. Hrg. 115-307 CYBERSECURITY: RISKS TO THE FINANCIAL SERVICES INDUSTRY AND ITS PREPAREDNESS ======================================================================= HEARING BEFORE THE COMMITTEE ON BANKING,HOUSING,AND URBAN AFFAIRS UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION ON EXAMINING CYBERSECURITY ISSUES IN THE FINANCIAL SERVICES SECTOR, FOCUSING ON THE RISKS TO THE FINANCIAL SERVICES INDUSTRY FROM CYBERATTACKS AND CYBER THREATS AND THE READINESS OF THE FINANCIAL SERVICES INDUSTRY TO COMBAT THEM __________ MAY 24, 2018 __________ Printed for the use of the Committee on Banking, Housing, and Urban Affairs [GRAPHIC NOT AVAILABLE IN TIFF FORMAT] Available at: http: //www.govinfo.gov / U.S. GOVERNMENT PUBLISHING OFFICE 31-197 PDF WASHINGTON : 2019 -------------------------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Publishing Office, http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Publishing Office. Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, po@custhelp.com. COMMITTEE ON BANKING, HOUSING, AND URBAN AFFAIRS MIKE CRAPO, Idaho, Chairman RICHARD C. SHELBY, Alabama SHERROD BROWN, Ohio BOB CORKER, Tennessee JACK REED, Rhode Island PATRICK J. TOOMEY, Pennsylvania ROBERT MENENDEZ, New Jersey DEAN HELLER, Nevada JON TESTER, Montana TIM SCOTT, South Carolina MARK R. WARNER, Virginia BEN SASSE, Nebraska ELIZABETH WARREN, Massachusetts TOM COTTON, Arkansas HEIDI HEITKAMP, North Dakota MIKE ROUNDS, South Dakota JOE DONNELLY, Indiana DAVID PERDUE, Georgia BRIAN SCHATZ, Hawaii THOM TILLIS, North Carolina CHRIS VAN HOLLEN, Maryland JOHN KENNEDY, Louisiana CATHERINE CORTEZ MASTO, Nevada JERRY MORAN, Kansas DOUG JONES, Alabama Gregg Richard, Staff Director Mark Powden, Democratic Staff Director Elad Roisman, Chief Counsel Travis Hill, Senior Counsel Elisha Tuku, Democratic Chief Counsel Laura Swanson, Democratic Deputy Staff Director Corey Frayer, Democratic Professional Staff Member Dawn Ratliff, Chief Clerk Cameron Ricker, Deputy Clerk James Guiliano, Hearing Clerk Shelvin Simmons, IT Director Jim Crowell, Editor (ii) C O N T E N T S ---------- THURSDAY, MAY 24, 2018 Page Opening statement of Chairman Crapo.............................. 1 Prepared statement........................................... 26 Opening statements, comments, or prepared statements of: Senator Brown................................................ 2 WITNESSES Bill Nelson, President and CEO, the Financial Services Information Sharing and Analysis Center (FS-ISAC).............. 5 Prepared statement........................................... 26 Responses to written questions of: Senate Banking Committee................................. 85 Michael Daniel, President and CEO, Cyber Threat Alliance......... 7 Prepared statement........................................... 35 Responses to written questions of: Senator Reed............................................. 90 Senator Warner........................................... 91 Senator Cortez Masto..................................... 91 Phil Venables, Chief Operational Risk Officer, Goldman Sachs..... 8 Prepared statement........................................... 46 Responses to written questions of: Senator Warner........................................... 94 Senator Cortez Masto..................................... 95 Carl A. Kessler III, Senior Vice President and Chief Information Officer, First Mutual Holding Company.......................... 10 Prepared statement........................................... 47 Bob Sydow, Principal and Americas Cybersecurity Leader, Ernst & Young LLP...................................................... 12 Prepared statement........................................... Responses to written questions of: Senator Warner........................................... 101 Senator Cortez Masto..................................... 106 Additional Material Supplied for the Record Letter submitted by the Credit Union National Association........ 114 (iii) CYBERSECURITY: RISKS TO THE FINANCIAL SERVICES INDUSTRY AND ITS PREPAREDNESS ---------- THURSDAY, MAY 24, 2018 U.S. Senate, Committee on Banking, Housing, and Urban Affairs, Washington, DC. The Committee met at 9:28 a.m., in room SD-538, Dirksen Senate Office Building, Hon. Mike Crapo, Chairman of the Committee, presiding. OPENING STATEMENT OF CHAIRMAN MIKE CRAPO Chairman Crapo. The Committee will come to order. Today we will hear about cybersecurity in the financial sector. Today's witnesses come from a wide range of organizations and can provide us with insight on the threats faced by and the preparedness of the financial sector when it comes to cyber. Four years ago, this Committee held a similar hearing where I noted that a recently aired ``60 Minutes'' segment called 2014 ``the year of the data breach.'' Given the various data breaches over the past few years, most notably the Equifax data breach last year, I am not sure that 2014 still holds that title. As our society increases its reliance on technology and becomes accustomed to immediate access to information and services from companies, the risk of--and the potential damage caused by--data breaches continually increases. Americans are becoming more aware of the amount of information, including personally identifiable information, or PII, that is stored by companies, and there is a growing realization that this information can be stolen or misused. The collection of PII by both the Government and private companies is something that has long troubled me. Many question how both use the data collected and how such data is secured and protected. The collection and use of PII will be a major focus of the Banking Committee moving forward, as there is broad-based interest on this Committee in examining it. Today we will hear from our witnesses regarding cybersecurity and about the risks to the financial services industry and its preparedness. We have heard from many regulators before this Committee about their focus on and oversight of cybersecurity and how it is critical to the operations of companies and our markets. This is especially true for companies in the financial services space. The financial sector itself is a main target for hackers because, as many have said, ``that's where the money is.'' Banks are under constant attack every day. Because of this, they and other firms in the financial services industry have devoted substantial resources to protecting information systems, and the industry is widely viewed as one of the most advanced sectors in terms of prioritizing cybersecurity. Today I hope to learn more about: the risks to the financial services industry from cyber attacks and cyber threats; the work being done in the financial services industry to increase cyber readiness, combat cyber attacks, and increase resiliency; and what more needs to be done by the private sector and Government to help protect companies' and consumers' information. It is critical that personal data is protected, consumer impact in the event of a data breach is minimized, customers' ability to access credit and their assets is not harmed, and the financial sector is resilient enough to continue to function despite a cyber breach at a financial sector company. I will welcome our witnesses again but welcome. And, Senator Brown, you may proceed. STATEMENT OF SENATOR SHERROD BROWN Senator Brown. Thank you very much, Mr. Chairman. Thank you for holding this hearing today. This Committee last considered cyber preparedness of financial institutions 3 \1/2\ years ago. Since then, sophisticated, targeted cyber attacks have become all too frequent, exposing the personal information of millions of Americans, costing our economy hundreds of millions of dollars. Cutting corners on cybersecurity risks real harm to real people's lives. Each data breach or each cyber heist that makes the news seems larger than the one before, and after a while, we barely raise an eyebrow. But think about a family trying to get a mortgage who finds out that their credit score has been wrecked through no--they do not have knowledge about it and it has been wrecked through no fault of their own. It is clear these risks to the financial system and Americans' personal data are growing. Today's hearing will give us a window into how the financial services sector works on cyber preparedness, fighting cyber attacks, promoting cooperation among private and public entities. Financial institutions must work diligently not just to maintain standards set by industry and Government, but also to improve protections for financial infrastructure and customer data whenever possible. As risks increase and threats become more advanced, financial institutions and Government agencies must facilitate and encourage information sharing. Banks certainly have the resources to invest in protecting their customers. The FDIC reported on Tuesday that banks are doing better than ever. Including the benefit from the tax bill, net bank income increased 27 percent compared to 2017. That has been consistent, in most cases double-digit profit increase over most of the last 8 years. Even without the tax benefits Republicans in Congress bestowed on the largest corporations and the wealthy, bank profits would have been up 12.6 percent from a year ago. Record profits for banks should not just mean that top executives get bigger bonuses and the largest shareholders benefit from stock buybacks and dividends. Banks should be investing in their businesses, whether it is cybersecurity or a living wage for their employees. I remember the average teller in this country makes $26,000 a year. Rather than lobbying to be let off the hook from rule after rule, the Nation's largest banks should focus their time and effort on securing financial infrastructure against attacks and protecting sensitive consumer data. Law enforcement also plays a critical role in assessing and warning about cyber threats, and its ability to share sensitive cyber threat information more quickly will help combat those threats. I know there has been good work done in this area. We need to build on it. We cannot let up now. And that is why I am glad the five of you are here. A secure and resilient financial system is the foundation of commerce and our economy. There is always the risk that cyber thieves will try to steal money and consumers' personal data or that a hostile country will seek to disrupt our financial system. We cannot risk undermining faith in that system. It would take just one cyber attack to undermine our trust in financial institutions. Once that happens, it will take more than hearings, legislation, or policy changes to restore that trust. I look forward to hearing all of you address these issues. Thank you all for joining us. Chairman Crapo. Thank you, Senator Brown. We will now move to our witnesses and their testimony. We have with us five excellent witnesses today, and I will briefly introduce Mr. Nelson, Mr. Daniel, and Mr. Venables, and Senator Brown will then introduce our two witnesses from Ohio. Senator Brown. Thank you. Chairman Crapo. Mr. Bill Nelson is president and CEO of the Financial Services Information Sharing and Analysis Center, also known as FS-ISAC, and has held such a position since 2006. FS-ISAC is a nonprofit association dedicated to protecting the global financial services industry from physical and cyber attacks. Its members include organizations from banks, credit unions, securities firms, and insurance companies. Mr. Michael Daniel is the president and CEO at the Cyber Threat Alliance. CTA was formed in 2014 through an informal agreement to share intelligence among Fortinet, McAfee, Palo Alto Networks, and Symantec. Prior to joining the CTA, Mr. Daniel served from June 2012 to January 2017 as Special Assistant to President Obama and Cybersecurity Coordinator on the National Security Council staff. Mr. Phil Venables is the managing director and head of operational risk management and analysis at Goldman Sachs. Mr. Venables has been at Goldman Sachs 18 years. His first 16 years he served as Goldman's chief information security officer, or CISO, before moving into a wider role in Goldman's Risk Division. Mr. Venables serves on the executive committee of the U.S. Financial Services Sector Coordinating Council for Critical Infrastructure Protection and is co-chair of the Board of Sheltered Harbor. Senator Brown. Senator Brown. Thank you, Mr. Chairman. It is my pleasure to introduce two Ohioans on this panel. I do not get this honor that often, so thank you. Carl A. Kessler III is a senior vice president, chief information officer of First Mutual Holding Company, 25 years of experience in technology, 15 in banking at super-regional and community banks, of which Ohio has a number of them. While working in banking, Mr. Kessler has tackled a broad range of cybersecurity issues, from building banking websites to designing security architecture. He began his career at the Department of Defense after graduating from the Honors College at Ohio University. Welcome. And Tom Fraser, the bank's CEO, and Mr. Kessler both do a really important and crucial job serving the banks' customers in northeast Ohio. The bank is located in Lakewood, Ohio, west of Cleveland. Welcome, Mr. Kessler. Bob Sydow is a principal at Ernst & Young and Americas cybersecurity leader. He has more than 30 years of experience working with Fortune 500 companies and all aspects of information security, data protection and privacy, identity and access management, cyber threat management, and cyber economics. I met with Mr. Sydow this week. I was impressed with his expertise in all things cybersecurity, and I was also impressed with his knowledge of all things Cincinnati Reds. While I am a Cleveland Indians fan in the other end of the State, I urge any of you that are baseball fans in this audience to at least one time go to a Cincinnati Reds opening day. It is a celebration of America's first baseball team. Cincinnati is a baseball town, and I have been to opening day half a dozen times there, and it is something, if you love baseball, you want to experience. But Mr. Sydow has promised if any of you will go, he will give you tickets and give you a tour---- [Laughter.] Senator Brown.----and tell you all things Cincinnati Reds history. So thanks to the both of you for joining us. Chairman Crapo. Thank you, Senator Brown, and I think I will try to take you up on your suggestion. I will not take the tickets, however. Gentlemen, we appreciate you being with us today and bringing your expertise to assist us with this issue. We will proceed in the order that you were introduced. I remind you that we ask you to keep your oral remarks to 5 minutes. You have a little clock there that is supposed to help you. And this is one of those days where we are jammed for time, hence the reason we moved the time of the hearing up. Both Senator Brown and I are a little jammed for time. So I am reminding our Senators as well that we want you to keep yourselves to your 5- minute limit, if you can do so. Actually, we will try to help you do so. Mr. Nelson, you may proceed. STATEMENT OF BILL NELSON, PRESIDENT AND CEO, THE FINANCIAL SERVICES INFORMATION SHARING AND ANALYSIS CENTER (FS-ISAC) Mr. Nelson. Thank you. Thank you, Chairman Crapo and Ranking Member Brown and other Members of the Committee, for inviting me to speak today. I do not have one of the timers, so cut me off if I go over 5 minutes. Chairman Crapo. Well, if you hear this sound [banging gavel] that means the bell rang. Mr. Nelson. I will discuss the topics that you mentioned already: cyber risks, efforts by the financial services industry to increase cyber readiness, and what more needs to be done by the private sector and Government to help protect companies' and consumers' information. As you mentioned in the intro, I have been CEO of FS-ISAC since 2006 and have seen some major changes occur in the last 12 years. I think the biggest change has been the growing sophistication and volume of cyber threats and attacks. In response, the financial services sector has made significant investment in cyber defenses and has come together as a community to back major resiliency efforts. I have also witnessed an evolution of the public-private partnership. Today the financial services industry receives tremendous benefit from that partnership that enables cyber threat intelligence to flow to the sector and improve detection, prevention, and response to cyber threats and other risks. By way of background, you mentioned that FS-ISAC is a private sector, nonprofit organization. We have been around since 1999, and our formal mission is provided in the written testimony. If I could sum it up in maybe just a few words, it is really to protect the financial services sector. There is an inherent strength in sharing derived from three fundamental pillars: one, the public-private partnerships; two, cross-sector sharing; and, most importantly, three, member-to- member sharing. We often think of FS-ISAC as a virtual neighborhood watch where financial institutions really keep an eye out for each other. One company's reported incident can help the entire sector respond and prevent the same attack from affecting their firm. Driven by the direction of our membership, FS-ISAC performs a number of key critical functions: we share threat and vulnerability information; we conduct coordinated exercises, often with our Government partners; we manage rapid response communications for both cyber and physical events; we produce education and training programs; and we foster collaboration with other key sectors and with Government agencies. We have grown rapidly in recent years. When I started, we had a little bit under 200 members. We have about 7,000 companies that belong to FS-ISAC today. These include, like you mentioned earlier, commercial banks, credit unions, but also stock exchanges, clearinghouses, brokerages, investment firms, insurance companies, payment processors, and financial services trade associations. We are headquartered in Reston, Virginia, and have expanded globally with members in 44 countries today, and we have a team of over 100 staff and consultants in eight countries across five continents. That is a long way from when I started in 2006 when we had me and about five outsourced people. That was it. So we have grown really in response to the threat. Each day, cyber risks evolve as attacks increase. We have invested a significant amount of money, but they continue, these cyber threat actors, to target the financial services sector. Their motivation varies. It can be corporate espionage. It can be stealing money. It can be launching disruptive attacks like we saw in 2012 and 2013 against about 50 financial institutions, and even destructive attacks. As they grow in their sophistication targeting, the primary evidence of these attacks are the types of attacks leveraged against financial institutions to steal money and disrupt. They include things like phishing; targeted email spear-phishing campaigns resulting in account takeover where they steal your money; also business email compromise which involves the compromise of legitimate business email accounts to initiate unauthorized wire transfers or ACH; ransomware attacks, we all know about that; distributed denial of service attacks, which can impede access to online services; and data breaches, which steal sensitive information. I think the sector has really come together in a proactive manner. As a result, we have greatly expanded our products and services to our members. We have devoted a large number of resources to really tailor them to smaller financial institutions and their service providers. At the same time, we have enhanced our analysis of threats and best practices for defending against those threats. We have expanded our exercise program, which includes an annual cyber attack against payment systems, or CAPS exercises, with thousands of participants last year, and have introduced the new cyber range program that allows members to have hands on keyboards, to gain experience to respond effectively to a real-live cyber attack. And we have improved our capability to respond to major cyber and physical incidents, including emergency member calls. The last couple, we have had over 3,000 members participate on. And we have expanded our in-person online member training programs. In addition to these efforts, we have also created two new subsidiaries--one to add an extra layer of security for consumer accounts, and the other to reduce systemic risk. At the request of leaders in the industry, we established the Sheltered Harbor in 2016 to enhance the industry's resiliency capabilities in the event of a major disaster or event. In conclusion---- [Laughter.] Mr. Nelson. I provide more details in my written statement, but let me highlight four recommendations. We are encouraging regulators to harmonize their cyber regulatory requirements, leverage authorities in the Cyber Information Sharing Act, CISA, and the USA PATRIOT Act to implement more effective information-sharing programs; number three, establish cyber deterrence and response capabilities, encourage adoption of global cyber norms; and four, support efforts to develop a technology-capable workforce. Thank you very much. Thank you for the opportunity. Chairman Crapo. Thank you for your flexibility. And we do read your written testimony very carefully. I want you to know that. Senator--I mean Mr. Daniel. I just about made you one of us. That probably was a demotion. [Laughter.] STATEMENT OF MICHAEL DANIEL, PRESIDENT AND CEO, CYBER THREAT ALLIANCE Mr. Daniel. Well, thank you very much. Thank you, Mr. Chairman, Ranking Member, other distinguished Members of the Committee. Thank you for the opportunity to come and speak with you this morning. What I think I can do is provide sort of a strategic overview of the threat context in which this industry is operating and then talk a little bit about what we have done to try to tackle the problem and where we need to go going forward. When you look out at the landscape, because we live in a digital age, almost everything in our country is now heavily dependent upon the internet and cyberspace. And so, therefore, these threats affect all of us. But the threat is actually continuing to get worse, and it is getting worse in four ways. One is it is becoming broader. As we create this Internet of Things, we keep hooking more and more of stuff up to the internet. And it is not just laptops and desktops anymore. It is your watch, your phone, your car, your light bulbs, a whole plethora of different devices. The threat is becoming more prevalent as more and more malicious actors, whether they are nation states or criminals, realize that they can try to achieve their goals by operating through cyberspace. The threat is becoming more dangerous as those actors are willing to undertake more and more destructive activities. If we had been having this hearing back when Bill first joined the FS-ISAC, we would have been talking a lot about website defacement. None of us talk about that anymore because that is the least of our problems. And then, finally, the threat is becoming more disruptive. As I mentioned, with our digital dependence, as it increases, things that used to be merely irritating now pose, you know, organizational existential questions. You know, I often say that when I first started working for the Federal Government in 1995, if the network went down, we just did something else for the day. You know, we worked on our noninternet-connected computers or we held meetings over the phone or did other things. And now if the network goes down, you pretty much send your workforce home because you cannot do anything. Now, for the financial services industry in particular, you know, they also face challenges related to both criminal and nation-state-enabled cyber theft, and those are a real problem for the industry. But it is also becoming clearer that the threat of disruption, those nation states that target the industry for the purpose of inflicting economic harm on the United States and the West is becoming a more prevalent threat as well. Now, one thing I want to hit on is actually there is a real question in here about exactly why cybersecurity is a hard problem, because at the surface of it, it looks like it should not be. After all, it is just computers and code. And so there is a question of why we simply cannot create a technical fix to this problem. But the answer is because cybersecurity is not just a technical problem. While there are technical issues about it, it is also an economics issue, a business operations issue. It is a human psychology issue. And it is a national security issue. And it is all of those things rolled into one. Cyberspace also plays by different rules than the physical world, so a lot of our analogies for how to do things and how to actually go about securing things in the physical world do not work in an environment that is a notable network that operates at light speed, where the concepts of time and distance and proximity all have different meanings and borders than they do in the physical world. And then, finally, this is a new environment. Stretching it to the maximum, cyberspace is barely older than me. And we have not had time yet to develop the body of law and policy and practice that we need to operate effectively in cyberspace. Now, we have certainly made a lot of progress over the last 20 years, including particularly within the financial services industry. I certainly agree with the characterization of the industry as one of the most, if not the most advanced sector in the country. And the level of investment from the FS-ISAC to the Systemic Analysis and Resilience Center, Sheltered Harbor, the investments that this industry has made are tremendous. But I do think that there is more that we can do on both the industry side and on the Government side. I think in particular on the Government side there is a real need to look at how the Government can focus on its comparative advantage where it has capabilities that the private sector does not and leverage the comparative advantage of the private sector where the private sector has capabilities that the Government does not have. The Government can also focus on incentivizing good cybersecurity behavior, and we could talk about that in the Q&A. And then, last, on the industry side, I think continuing to invest and having the industry figure out how the larger institutions can help the smaller institutions that do not have the same level of capability also make progress in their cybersecurity is a very necessary step. So, with that, I will conclude my opening remarks. Thank you very much. Chairman Crapo. Thank you, Mr. Daniel. Mr. Venables. STATEMENT OF PHIL VENABLES, CHIEF OPERATIONAL RISK OFFICER, GOLDMAN SACHS Mr. Venables. Thank you. Chairman Crapo, Ranking Member Brown, and other Members of the Committee, thank you for this opportunity to testify at this hearing today. As we all know, this is an increasingly important topic. A number of factors are contributing to increased risk across the financial services sector, and this is primarily due in many respects to the digitalization of finance and the globally interconnected nature of the system. The same trends that are increasing benefits of the global financial system are also bringing on these new and enhanced risks. On threats, as Bill and Mike have described, we are seeing increases threats from organized criminal groups and nation states for various different motivations around the world, and it is also worth reminding ourselves that we are not just facing cybersecurity risks. We are also seeing many risks in relation to how technology has managed and provided risks from resilience issues and software errors. And so while cybersecurity is tremendously important, it is also significant and also to focus on technology risk in general. It is critical to have shared defenses across the sector so that all institutions, large and small, can learn from each other's best practices and so that threat information can be shared among firms, reducing the likelihood that attackers can execute their strategies without response. We have a long history of robust information-sharing processes, and as Bill describes, the FS-ISAC is acknowledged as a preeminent example of such capability. We have established tighter coupling between the major firms using the Financial Systemic Analysis and Resilience Center, the so-called FS-ARC. And also under the Department of Treasury's leadership with various different initiatives through the Sector Coordinating Council, we have also increased sector-wide resilience, including formalized sector-wide drills and exercises that have spawned other initiatives, like Sheltered Harbor--an initiative to encourage and demand institutions maintain immutable data vaults to resist cyber attack. Turning our attention to regulators and regulation, we benefit from a number of strong regulators across the financial sector that stipulate cybersecurity and other controls that reduce the risk of major incidents. This includes regular examinations and reviews. We continue to support the need for harmonization across regulation, domestically and globally, and we commend the efforts to date from the industry and regulators and Government on the use of the NIST Cybersecurity Framework. Notwithstanding the strong relationship between the public and private sectors, we continue to focus on improvements here, particularly around metrics to make sure that we are able to quantify the value and timeliness of the information flow between the public sector and private sector. Despite all this coordination and response to cybersecurity threats, risk still remains, and we need to continue to be vigilant to adjust the defenses of individual firms and the sector as a whole by making sure we adopt innovative approaches to protecting customer data as well as making sure that we are protecting the services that we offer. The goal here is to reduce single points of failure and also single focal points of attack. Finally, I would recommend all organizations that operate critical public services or protect customer data adopt strong defenses and security programs based on a number of different approaches, specifically: Integrate cybersecurity into the fabric of organizations, from business risk management processes, strategy and product development to the foundation of how the technology is built and operated. Second, improving capabilities amongst people, processes, and technology. There needs to be continued emphasis on the embedding of controls into critical technology products and services. We need secure products, not just security products. We should also recognize that cybersecurity risk mitigation is not solely the responsibility of designated cybersecurity professionals but is, perhaps more importantly, in the domain of leadership, risk managers, and engineers at all levels of organizations. In other words, we need more security-minded people, not just security people. And, finally, design for defensibility. Our goal should be to design our technology and information processing environments to be more inherently defendable and resilient in the face of attacks, and we have to keep examining our global supply chains to look for security issues and avoid excess concentration risk in services and geographies. Thank you, Mr. Chairman, for allowing me to provide this input, and I look forward to taking questions as we go through the panel. Thank you. Chairman Crapo. Thank you. Mr. Kessler. STATEMENT OF CARL A. KESSLER III, SENIOR VICE PRESIDENT AND CHIEF INFORMATION OFFICER, FIRST MUTUAL HOLDING COMPANY Mr. Kessler. Chairman Crapo, Ranking Member Brown, and distinguished Members of the Committee, thank you for the opportunity to testify before you today. I will share the unique perspective of a front-line practitioner on the practical pros and cons of cybersecurity regulation, information sharing, and community bank collaboration. Two key regulatory changes have positively improved the approach of community banks in managing cybersecurity risks. In the wake of the Dodd-Frank Act reforms, supervision of our affiliate banks migrated from the OTS to the OCC. In the last few years, FFIEC established the Cybersecurity Assessment Tool, or CAT. These changes have led to an ongoing dialogue with regulators. The CAT provides a standard way to assess risk and provides guidelines for what controls might be appropriate. Highly trained examiners are critical. Because of the changing nature of the threat environment, an exam is never a static, check-the-box activity. It is always a dynamic conversation. My recommendation to this Committee is to ensure the consistent availability of highly trained IT examiners whose skills are in high demand in both the public and private sectors. Another consideration for this Committee is to ensure that similar cybersecurity rigor exists among nonbank financial services companies. How do we safeguard customer data at companies that are outside the oversight of prudential regulators? Community banks rely heavily on a network of third-party service providers. While we always maintain primary accountability for safeguarding customers' information, a significant portion of the risk lies with core processors, payments networks, and large providers. This concentration of financial services into a few providers creates both advantages and challenges. One challenge is that the current system relies on a high degree of blind trust in the service provider with limited transparency. We depend on our regulator to examine our service providers and identify patterns of compromise and ensure remediation. At the same time, law and regulation require us to monitor the effectiveness of our service provider's controls. This opaque approach runs contrary to best practices in vendor management. One solution might be to create a cybersecurity scorecard aggregating data from many sources including regulatory reviews. This scorecard would impact vendor selections and create positive momentum toward control improvements. It is most critical that we have timely access to information sharing of active threats through public and private partnerships. The key for banks is that a comprehensive ecosystem of financial service providers shares threat information in real time to an entity qualified to analyze, verify, and then communicate it back digitally to our bank where we can use it to adapt our controls. We need our third- party providers to share cyber threat information quickly with industry partners like FS-ISAC, the goal being to respond in seconds or minutes rather than days or weeks. Timely information sharing is foundational to the industry's ability to combat a cyber threat. We cannot act on information we do not have. Important questions remain regarding if, when, and how businesses can share threats. There is still a great reluctance to share information. Liability, contract, and privacy concerns are the most often cited reasons. While customer notification and privacy laws are clearly needed, simplification and modernization of the relevant laws and regulations should enable information sharing. This is a good time to re-examine the effectiveness of cybersecurity law. Certainly, any solution must guard against shifting the liability to consumers from those who failed to protect their data. Our mutual holding company is faced every day with the challenges required to implement an information security program. We deliver that same program to our affiliate banks in a manner that they otherwise could not afford, design, or staff. In our three affiliations, we have preserved a local banking presence, improved security controls, and done so at a minimal marginal cost. This has proven a game changer for our affiliates. In summary, the best way to protect consumers is to increase transparency and information sharing within the financial services cybersecurity ecosystem. This Committee could help move this forward by encouraging the transparency of the performance of third-party service providers. You can also help by passing legislation which further encourages information sharing so that active threats are identified and mitigated in minutes. Thank you for the opportunity to testify before you today. I stand ready to work with you in any way that I can to protect consumers and our financial system, and I look forward to answering your questions. Chairman Crapo. Thank you, Mr. Kessler. Mr. Sydow. STATEMENT OF BOB SYDOW, PRINCIPAL AND AMERICAS CYBERSECURITY LEADER, ERNST & YOUNG LLP Mr. Sydow. Thank you, Chairman Crapo, and thank you, Ranking Member Brown, for that kind introduction. The Reds need help. My name is Bob Sydow. I am Ernst & Young's (EY) Americas cybersecurity practice leader. I refer the Committee to my written testimony on details on my remarks. Cyber attacks are on the rise. No organization, large or small, public or private, is immune to the threat. Our clients face three significant challenges: emerging interconnected technologies drive fundamental transformations and create complex third-party ecosystems; the volume, velocity, and precision of attacks; and the shortage of cybersecurity resources and skilled professionals. EY works with clients across all sectors, and many should be commended for their efforts. In my experience, financial services, especially the largest banks, are considered best in class, not only in terms of organization and investment but also for leading engagement with stakeholders across the ecosystem. Large banks are accustomed to higher levels of regulatory scrutiny, and their third-party risk management programs tend to be more mature and robust. But challenges remain. Today financial institutions deal with third-, fourth-, and fifth- party risk. In addition to vendor risk most institutions struggle to secure resources and talent. Experienced cyber professionals are in high demand. Often small firms turn to third-party providers to meet those needs. There is no one-size-fits-all solution, so I will focus on three areas where EY believes risks can be mitigated: corporate governance and risk management, the AICPA Cyber Reporting Framework, and policy solutions. Ultimately, the board is responsible for governing a company's risk appetite and providing credible challenge to management. By doing so, boards help protect investors and enhance the company's value and performance. Banks use a three- lines-of-defense risk management model. The larger ones are adopting this model for cyber. EY considers this a best practice. Increasingly, regulators, investors, and others want financial institutions to build cyber resiliency strategies into the three lines. Another challenge is understanding and communicating about a cyber program's efficacy. While NIST and others have developed implementation guidance, there has been no means to evaluate and report on program effectiveness. This distinction is subtle but significant. In response, the American Institute of CPAs recently developed the Cyber Risk Management Evaluation and Reporting Framework. This is voluntary and can provide stakeholders with reasonable assurance that the identification, mitigation, and response controls are in place. No framework can guarantee against a breach, but the AICPA cyber risk model can offer an independent, validated understanding of a company's systems, processes, and controls. Unfortunately, there is no single legislative, regulatory, or market solution that can guarantee against a cyber event. Bad actors are not constrained by regulatory, liability, or jurisdictional issues let alone ethics. Policymakers and the business community should work together to foster collaboration and improve intelligence sharing. We need flexible and harmonized policy solutions that recognize the dynamic challenge of cybersecurity and clarify conflicting directives. We need to balance the need for compliance with a need to manage cybersecurity and protect consumers. EY believes companies that engage in good-faith efforts, establish enterprise cyber risk management frameworks, and adopt best practices should be recognized, especially relative to liability and penalty measures. Finally, EY encourages Congress to support modernization of Government's cyber posture, to focus on developing solutions to address cyber workforce shortages, and to educate the public and help the country as a whole improve its cyber hygiene. EY's purpose is to build a better working world, and so I thank you for providing the firm an opportunity to share our views and expertise. I welcome your questions. Chairman Crapo. Thank you very much, Mr. Sydow. In the interest of time, I am going to go last, if there is time before I have to leave, and so I will turn first to Senator Brown. Senator Brown. Thank you, Mr. Chairman. Mr. Kessler, do you think the current baseline for protection of consumer information is adequate? Or would you like additional control over how your personal information is stored or used by financial institutions? Mr. Kessler. Well, I think we are all interested in knowing what is happening with our personal information. I am personally assured when I am able to receive real-time alerts of when that information is changed, when it is affected, and changes to my credit reports. I think that there are obviously opportunities to continue to share more information with our consumers in that respect. Senator Brown. And when there is a breach involving personally identifiable information, I assume you think it is important for a financial institution to quickly notify customers, giving them the ability to protect themselves by freezing or monitoring their credit file? Mr. Kessler. Certainly, we like to take--as a mutually owned community bank, we like to take all the necessary actions to protect our customers in a timely way. So, yes, we find it very important to notify the customers as soon as is practical after working with the necessary law enforcement officers. Senator Brown. Thank you. Mr. Sydow, many community bank IT services are provided through large third-party service providers. Talk about the economies of scale when it comes to cybersecurity that community banks benefit from by using large service providers. Mr. Sydow. Well, it is a matter of resource, Senator Brown. The larger organizations can afford the staff and recruit and retain the kind of talent that you need in a cybersecurity department and the focus that they can provide. They have the resources to buy the technologies and install and implement those that a smaller organization would not have. So if a smaller bank were to use those services, they have access to cybersecurity kind of resources that they would not have if they tried to do that in-house or on their own. Senator Brown. OK. Thank you. President Obama in 2009 established the position of White House Cybersecurity Coordinator to work straight cybersecurity efforts across all Government agencies. President Trump recently eliminated that position. That is the position Mr. Daniel held in the Obama administration. Will that help or harm Government's efforts to make the country and especially the financial system more resilient and stronger against cybersecurity threats? Are you concerned about that? Mr. Daniel. Well, yes, I am Senator. I think the reason that position was created was because, as a very new policy area, we need to drive better coordination across all the different parts of the Federal Government that have a role in cybersecurity, and so I believe that having a strong leadership at the White House level is a real necessity right now. Senator Brown. Do you know why he eliminated it? Mr. Daniel. I do not. I presume that they were looking for ways to streamline the bureaucracy on the NSC staff. At least that was the statement that was given. But I am not sure of the reasoning behind it. Senator Brown. OK. Thank you. Mr. Sydow, you talked about workplace shortages in my office this week and then in your testimony, and this is not really a question, but as evidenced by the look of this panel and, frankly, the look of most of us up here, as evidenced by the fact that, of the 30 largest banks in this country, there is a female CEO only at KeyBank in Cleveland. We do not really do a very good job in financial services and technology at bringing a more diverse workforce, one of the reasons, clearly, that we all face--that you and we face workforce shortages and attracting people, as Mr. Sydow pointed out. So I hope that we all pay more attention to STEM programs for women and for people of color. We will bring more qualified people in, give more opportunities, and, frankly, have more diverse perspectives in the way we all do our jobs. Thank you, Mr. Chairman. Chairman Crapo. Thank you. Senator Rounds. Senator Rounds. Thank you, Mr. Chairman. Mr. Daniel, I would like to more or less just visit with you for a little while, and I would love input from the others as well. I have the opportunity to serve as the Committee Chairman on a Subcommittee for the Department of Defense's cybersecurity. I am just curious. Along the same lines as Senator Brown has indicated, that there had just been a change in which we do not have anybody at the White House who is directly responsible for the cyber defense, I am just curious. You have had the opportunity to work at the Federal level. Now you are part of a nonprofit organization that represents a number of different financial institutions. In February of last year, the Department of Defense's Science Advisory Board put out both a classified and an unclassified version, not very long, 26, 27 pages, explaining the need for our country to have not only a strong--the ability to attribute where attacks from outside the country were coming into the country, but it also identified that we would not have the capability to keep people out of our critical infrastructure if they wanted to get in, both organized crime organizations but also other near peer competitors, nation states. Along with that, it indicated that for the next 10 years we would be at risk and that one of the best approaches we could do would be to make it very expensive for those organizations to get into our financial institutions--in fact, any of our critical infrastructure. But it also made the point that we had to have a very strong offensive capability as a deterrent, similar to a nuclear deterrent today. I would like to know, right now at the financial institutions level--and you work with a number of them--do you believe that we have a model in place today on a voluntary basis, which I am in favor of, but one in which we are at the same level across the different institutions that can then be protected almost in an umbrella-like position by Homeland Security capabilities, Department of Treasury capabilities, and then we will talk about DoD capabilities. But just your thoughts on that and how they connect with the Federal responsibilities. Mr. Daniel. Sure. So I think you are very right that if you look at our level of digital dependence, as I talked about, and particularly in the financial services industry, clearly cyber threats are a major problem that this industry has to be dealing with. I think when you look at the nature of the threats that they face, it is going to--anybody that tells you they can give you, as several of the panel members said, a guarantee that you will not have any cyber incidents at all, they are selling you snake oil. And what you can do, however, is manage that risk and drive that risk lower, and that requires cooperation between both the Government and the private sector in some ways that we are not completely used to in the physical world. And I think it requires bringing all of the capabilities to bear both from the private sector side and enabling good information sharing and coordination and collaboration on the private sector side, but also within the Government, between, as you mentioned, the Department of Treasury, Homeland Security, Defense, State, Justice, and in between the Government and the private sector. Senator Rounds. Let me bring this--because we are all going to be time limited today. Do you think the American public today thinks that with regard to their financial services, their assets, their checking accounts and so forth, do you think they believe that the Federal Government has a role to play in protecting those assets? Mr. Daniel. I think they do. Senator Rounds. Would it be fair to say that today Homeland Security has the ability to try and notify you and Homeland Security has the ability to try and assist in the defense? But with regard to going outside, if the attribution indicates that it is coming from outside, is it fair to say that Homeland Security does not have the ability to respond offensively to stop those attacks before they actually occur? Mr. Daniel. Well, I think that the ability to--it is a shared responsibility on the defensive side, and that is why I say that you have got to do that good integration across all of the different parts of the Federal Government that do have both the network defense mission and the offensive mission. Senator Rounds. Let me put it this way: If there had been an attack on an institution here and it was an attack--we have a bombing and so forth, everybody would assume that the Federal Government has the first role in protecting against that. Would it be fair to also say that when it comes to cyber attacks, we have a challenge in that we do not have the policy in place today to provide for that direct protection up front? Mr. Daniel. Well, I actually do not believe that it is possible for the Federal Government to provide that same kind of protection in cyberspace that it does in the physical world due to the way that cyberspace works. And I believe that it will always be a shared mission between the private sector and the Federal Government to achieve the level of protection that we need. Senator Rounds. Thank you. Mr. Chairman, my time has expired, but I think this is a very good meeting to start out that discussion. Thank you, sir. Chairman Crapo. Thank you. Senator Reed. Senator Reed. Thank you very much. Gentlemen, thank you for your excellent testimony. Also, let me as the ranking Democrat thank and commend Senator Rounds for his leadership on the Cybersecurity Subcommittee. Thanks, Mike. Senator Crapo, Senator Brown, thank you. This is a very important issue. One reason I think it is very important is that I have legislation, S. 536, the Cybersecurity Disclosure Act, bipartisan legislation with Senator McCain, Senator Collins, and Senator Warner, and it would simply require disclosure by public companies, which is the usual tradition of public companies, of whether they have a director who is a cyber expert or they have some other arrangement. We do not mandate what they do, but I think it is essential to have public companies particularly tell their shareholders and the markets what they are doing at the highest level when it comes to this issue of cybersecurity. And you have described all the different ramifications throughout your testimony. But I would like to just focus for a moment, if I could, with Mr. Daniel, and that is, Chairman Clayton was here a few weeks ago, Mr. Daniel, and he said: I think cybersecurity is an area where I have said previously I do not think there is enough disclosure in terms of whether there is oversight at the board level that has a comprehension for cybersecurity issues. That is something that investors should know, whether companies have thought about the issues, whether there is a particular expertise on the board or not, that is something companies should know. It is a very important part of operating a significant company. Any significant company has cyber risk issues. And my question would be: Do you agree with that sentiment? Mr. Daniel. Yes, I do. I think that the nature of cybersecurity right now is that we actually do need more disclosure. We have an information asymmetry, if you will, and it is hard for markets to operate efficiently when there is information asymmetry. So steps that the Government can take to enable more investors, the public, and others to have more information about how companies are tackling the cybersecurity problem I think is generally a good thing. Senator Reed. And just a quick follow-up. You have noticed, I would guess--I do not want to put words in your mouth-- variable sort of attention to these details. There are some companies that have very sophisticated individuals on the Board or arrangements. There are other companies that are essentially free riders. Is that true? Mr. Daniel. Well, I think that this is an area where companies are still learning how to address the issue, and some industries and companies have been way more forward-leaning than others. So I do think it is true that the capability across the board varies a lot. Senator Reed. Thank you. Mr. Sydow, again, thank you for your testimony. I was very struck with the comment: At Ernst & Young, we believe that boards must be educated about cybersecurity so that they are able to make appropriate decisions anchored in sound logic and data. By doing so, boards will not only be protecting shareholders, but they will be enhancing the company's value. And, interestingly enough, the Vice Chair of the Fed, Mr. Quarles, stated: The idea of having a board member with cyber expertise, when I have been on boards that had a board member with that kind of expertise, that is an extremely useful--that has not just been a nice thing to have. It has been extremely useful. So, again, the basic theme, does this make sense to have this disclosure provision so that boards have some expertise? Mr. Sydow. Senator Reed, thank you for the question. I have been in this role about 5 years, and I have gone to a lot of Board meetings, and I think there has been increasing importance placed on cybersecurity in those discussions, and often there is a challenge between the translation between the technical world and the business world at those meetings. And I think that is something that--a gap that needs to be closed. However, in my remarks I also said to you that there is a shortage of qualified cybersecurity professionals, especially the people that can make that translation. So as long as you have flexibility in that and allow the boards ways to get access to those kind of individuals, I think that makes sense. Senator Reed. Indeed, this legislation is not prescriptive. It is simply, ``Tell us what you are doing. In fact, tell your shareholders and the markets what you are doing,'' which I think makes a great deal of sense. One of the reasons, among many, as Ranking Member of the Armed Services Committee, we had the general officer in charge of TRANSCOM, all of our transportation assets, and in an international crisis, he would be responsible to move people by aircraft, by sea, all of our military personnel to get the mission done. And he just said, volunteered that he talked to cybersecurity officers and companies that have no dialogue with their directors. And I can assure you that if something happens, probably the first strike will not be a kinetic strike against the military. It will be a cyber strike against this infrastructure of movement, logistics, et cetera. So this is another reason why I think we really do have to have some legislation like we are proposing. So thank you all very much, gentlemen. Thank you, Mr. Chairman. Senator Brown. [Presiding.] Senator Heitkamp. Senator Heitkamp. Thank you, Ranking Member Brown, and thank you for having this hearing. I think it is critical that we have the ongoing conversation. A couple points to begin with. I think the American public has given up, and I think that there is a huge variance between understanding privacy and understanding cybersecurity. They are not the same thing. And, you know, so most Americans say, look, I no longer believe that I have privacy. I do not know that you can regulate this. I do not know that you can control this. But they definitely want cybersecurity. And so one of the things that I believe as a former law enforcement official is that, you know, you can have all the most sophisticated law enforcement equipment, surveillance equipment, but you have got to teach people to lock the door. You have got to teach people to lock their car. You have got to teach people to pay attention, maybe put some surveillance equipment of their own. And so I talk about cyber hygiene and the role that cyber hygiene should play either with employees, not just, you know, at that level of the people sitting on the board, but at every level being trained and understand the challenges, but also with membership or clients or patients, what role do they play? What role do vendors play? We all harken back to what happened with Target. The Target breach was related to a vendor and a back-door worm that came in. So how do we build better resiliency, cyber resiliency, within the community, writ large, within all users, so that they understand that there are simple things that they can do that will help protect the cyber system, protect our overall system, while we are looking for that iron dome--let us put it that way, that iron dome that is going to make what we do impenetrable--which, quite honestly, I am not convinced you are ever going to get an impenetrable iron dome. And I think that the fault lines are always going to be at that lower level. So someone, anyone on the panel who wants to take on the issue of cyber hygiene and what we should be doing here to encourage it, to educate, to move this issue of every user needs to be informed on how we protect ourselves from a cyber attack as a country as a whole, kind of a ``lock your door'' strategy. Mr. Venables. Thank you, Senator, for the question. I will go first, and then others can chip in. I think you raise an extremely important point. I think in many respects we need to focus on basic cyber hygiene to make sure the easy attacks cannot be successful so we can focus our energy on the most sophisticated attacks. And I think it is the responsibility of all companies not only to make sure their employees and their own infrastructure is protected, but also to educate those employees and to educate our customers. I think this is a partnership that we can do between Government and the private sector to educate everybody around what best practices they can do to adopt the right controls for---- Senator Heitkamp. I really do believe, as a former kind of customer protection/consumer protection advocate, that people want the tools. They want to understand how to do this. What can we do to provide easier accessible tools to lock the door? Mr. Nelson. Mr. Nelson. Yes, thank you. Just to give a plug for the multi-State ISAC, it is a State and local Government ISAC, and the October Cybersecurity Awareness Month, they produce every month a cybersecurity newsletter. It is weight-labeled, so you can put it on your company's letterhead, give it all to your employees. It is a great effort. It has been going on for a couple years, and we all kind of get geared up for that month in October to educate consumers. So there are some efforts underway. It is a Government initiative, too, at the Federal level and the State level. Senator Heitkamp. Mr. Daniel? Mr. Daniel. Thank you, Senator. I also think that it is incumbent upon the industry, the cybersecurity industry, to make that cyber hygiene and the cybersecurity that you talk about as simple as possible for consumers to do. You know, for example, right now our guidance out to consumers is to have a 16-character password that is not any actual words in the English language, that has all sorts of---- Senator Heitkamp. And, you know, for a spreadsheet full of media passwords, they are all going to be different, like really? Mr. Daniel. Yes. And we need to get much better at enabling people to have very simple ways to do their cybersecurity. Sort of the analogy I use is that we make it very simple for people to use seat belts when you get in a car, and we do not expect you to answer questions about whether or not you want the antilock brakes to work. And so I think we need to try to find the same, similar kinds of solutions and approaches in cybersecurity. Senator Heitkamp. What grade would you give us right now in terms of how protected we are in a cyber hygiene world? Mr. Daniel. Well, I think we are certainly better off than where we were, say, you know, 5 or 6 years ago. So we certainly have made a lot of improvements. The problem is the bad guys keep improving as well. So I think that we still have a long way to go. Senator Heitkamp. Just a couple more comments, if that is OK. Mr. Kessler. Certainly, educating all Americans, as you are suggesting, is important but a monumental task. We try to approach it by educating our internal employees not only how to properly handle customers' information but their own, and then we attempt to engage with our customers when there is an event. For example, I think where you are going is if somebody is willing to buy gift cards in order to pay the IRS, there is a problem there. And how can we communicate to folks that this is not something they should be doing? I like the notion of a Cyber Education Month, and one of my peers here suggested including cybersecurity education in curriculums in higher education and in other parts of our academic--our normal education, which I think is a really good idea. Thank you. Senator Brown. Senator Cortez Masto. Senator Cortez Masto. Thank you. Thank you also. This is such an important conversation, and we have been having this, I know, on various committees that I sit on. I appreciate the discussion today. Let me say, you know, about 10 years ago, I remember sitting with our Nevada Banking Association, and we were talking about how we guard against identity theft. Now, 10 years later, we have a proliferation of cyber threats and attacks that we had not even contemplated at that time. But I was struck, Mr. Daniel, by your comment to Senator Rounds that this cyber infrastructure is a little different and how we manage the enforcement and collectively address these issues. And it is not just Government's role to comment. It is everybody's role now to play a part in addressing the cyber infrastructure and protecting against cyber threats. And I think that is important for everybody to understand. That is the first time I have heard somebody say that. And it is. It is important because it goes back to this issue that we have been talking about. Everyone has a role in education. To me, education is the first step in prevention. But everybody has that role in education. Everybody has a role in the coordination and the information sharing. When I say everyone, from Government to the private sector, the consumer, everyone has a role, and the businesses as well. And then the workforce shortage that we have, that I have heard here as well, we can all play in this discussion. Let me follow up on a couple of comments that were made. One of them, Mr. Kessler, you talked about the need to pass legislation that encourages information sharing. Can you go into a little bit more about that and what you are talking about? Who is sharing the information? What type of information are you referring to? Mr. Kessler. Sure. Thank you very much. As a community bank and a smaller institution, we would benefit from a lot of what Mr. Daniel has already talked about in terms of the sharing of indicators of threat throughout the industry. So as another bank identifies something, they would share it, and we would automatically protect against that. There are challenges today, when I talk to my service providers and ask them are they participating with FS-ISAC, the answer is yes. Are they sharing threats in real time? I often get the answer no, and the cited reasons are they have confidentiality agreements with us, they have privacy requirements, all things that we all agree are absolutely valuable and essential, but at the same time, from my point of view, are preventing us from receiving some of that threat intelligence that would help us to further protect the customer's privacy. Mr. Nelson. I would like to comment on that. I think one of the great things about the FS-ISAC is you can share anonymously on the portal, so I would encourage your third-party processor to get in touch with me, and we can work on that. We get legal objections all the time. A lot of times we first get involved in the FS-ISAC, you think, ``Oh, my name is going to be in the paper tomorrow if I share.'' Well, it does not happen. We have pretty good controls around that information. It is not shared with attribution. In fact, every time there is an attack, our members are sharing online real-time. In fact, I was visiting a CISO in Charlotte, North Carolina. You can guess which one. There are a couple big ones there. And I was meeting with him, and he had to leave to go into a special meeting for an attack that was occurring. I whip out my BlackBerry or at that time I guess it was my iPhone, looked at it, and there was the alert already. I did not say where it was coming from. I knew it was from him. So it was happening that fast while they were actually in a war room handling the attack. So it can occur. It is just getting the right people. And lawyering up is not the answer. The answer is talk to us, let us get involved in it, and it is a pretty good voluntary system. We get lots of members sharing information. We have other third-party processors that are sharing. Senator Cortez Masto. Thank you. So I would be interested in knowing at the Federal level if there is legislation that actually needs to be introduced or if it is more just communication and working together. I know my time is running out, but we are talking a lot of acronyms here as well. FS-ISAC, can you explain a little bit more what that is? And I recognize, I come from Nevada, I am not so sure we have that type of coordination. I know it is on the coasts, but I am not sure it is happening in every single State, or there is that collaboration. Mr. Nelson. It is happening in every State. It is happening in 44 countries. We have 7,000 companies that are members now. It was interesting. In 2014, Senator Crapo mentioned that was the year of the data breach. It was also the year that the FFIEC, which is the regulatory agencies, the banking regulatory agencies, like the FDIC, OCC, even the National Credit Union Administration, and others, put out a policy statement saying you should share information if you are one of our regulated entities, and you need to belong to FS-ISAC. We affectionately--_ Senator Cortez Masto. Which stands for and means? Mr. Nelson. Financial Services Information Sharing and Analysis Center. And when that happened, we affectionately refer to that as the membership tsunami started. We had 2,200 companies join that year, and we have been growing ever since. When I started, we had 200 members in 2006, and it has just been hockey stick growth the last few years. Senator Cortez Masto. Thank you. I know my time has run out. Thank you very much. Senator Brown. Senator Jones. Senator Jones. Thank you, Mr. Chairman. And thank you to all the witnesses for being here. I agree that all of a sudden everything that I am seeing up here, there is some element of cybersecurity. It does not matter what committee I am on. It touches everything. And I think you guys touched on this before I got here, and that is the cyber workforce and trying to keep pace with the demand. In Alabama, we have got Auburn University, which has got an incredible facility. Their cyber research center, University of Alabama in Huntsville, has one. And so we are doing our share down there. But if you could, just expand a little bit on challenges that are being faced because so many industries are now competing for this workforce. And that is only going to grow, I believe. It is only going to grow. And so what can we do, what can the industry do? What are the challenges? Is there anything that we can look at in the Senate and the Congress to try to help with increasing the workforce for cybersecurity? I will just let you guys fight it out. Who wants to answer? Mr. Venables. I can go first, Senator. I think it is a really interesting question because I think while the backdrop, we have to continue to encourage STEM education at all levels to feed a solid technology and engineering workforce for the Nation. I think also we have to not just focus on having trained and dedicated cybersecurity professionals, but thinking across all sectors from whether it is business risk management through to engineering through to product design, in making sure and encouraging in some way that every part of that, whether it is vocational training, academic training, professional qualifications, have an element of thinking about cybersecurity, privacy, and other aspects of technology risk and ethics about how we use technology. So I think while it would be very important to continue to focus on creating more cybersecurity professionals, I think most of us worry just as much about making sure that every part of our workforce, both private and public, is equipped with the skills to think about how to manage this risk as a core part of their job. Senator Jones. That is good. Mr. Sydow. Senator, the other thing I think we can do is expand the pool. Right now females only represent 9 percent of the cyber workforce, and we have the same issue across technology. We need to continue to encourage young ladies to join the profession. I know at EY we do several things, Girls That Code, other things to encourage organizations to get women into the workforce. I think that would be helpful to expand the base. Senator Jones. Right. We have done a pretty good job of that in the political world because they are all running for office this year. But I agree with you, that is incredibly important. You know, Bishop State, I was down there visiting a junior college recently, and Apple has a coding program that they are working on with the students down there. I would assume that cybersecurity is always going to be a part of that as well. So thank you. I do not know if anybody else has anything on that, but if not, I have got one more. Mr. Daniel. Well, the only thing I would add, Senator, is that I also think that we need to diversify our thinking about what we mean about the cyber workforce. Just as in health care not everybody is trained up to the same level as a neurosurgeon specialist, we need to diversify our thinking about the levels of training and who does what in the workforce so that, again, we can also continue to expand that pool. Senator Jones. Perfect. Thank you for those. Those were great answers. Thank you. I want to kind of followup real briefly on something that I think Senator Reed kind of touched on as well, and that is the assessment of the risk, because I understand his bill to try to get more information into investors and the marketplace about cybersecurity at companies. But I am wondering if any of you think that those ought to be--you know, something about cybersecurity threats ought to be included in the risk. When a business or, in particular, for instance, a municipality is rated, bondholders often would look at a municipality, for instance, as to whether or not that bond is going to be safe because of cybersecurity. Is there a way that we should rate using cybersecurity as well? Mr. Venables. I think there is a number of existing disclosures that occur particularly for public companies as part of their regular filings and risk disclosures, and certainly all the requirements to disclose if major events, particularly material events, occur. I think there is also a lot of work in the industry where there is more and more public ratings of the outward appearance of various different companies, and certainly I think a lot of the big audit firms, as the gentleman from Ernst & Young mentioned, working with us on various different standards through the AICPA to be able to vet and independently assess the level of security and risk in those companies. I think it would be interesting to further explore how that could be married with other types of public disclosures so you get a full picture of the risk of organizations. I think it is certainly something there is a lot of activity on and probably is worth future consideration. Senator Jones. Great. Well, thank you all very much. Thank you, Mr. Chairman. Chairman Crapo. [Presiding.] Thank you. Senator Brown has one---- Senator Brown. Yeah, one question. It is really a yes or no question for Mr. Kessler. You talked about how important it is to notify your customers. Did Equifax share information with you about the breach in time to help your bank's customers? Mr. Kessler. No. Senator Brown. OK. Thanks. Chairman Crapo. Senator Warner, just under the wire. You have got 5 minutes or less. Senator Warner. Thank you, Mr. Chairman, for that gracious accommodation. [Laughter.] Chairman Crapo. We always appreciate you. Senator Warner. Mr. Venables, we have a lot of legacy IT systems that are out there. Some of the systems are still Fortran and COBOL. You know, how do we make sure, as we do upgrades--and I understand the United Kingdom just went through a complete meltdown when they tried to--one of their banks tried to do an upgrade of their system. How are we thinking through this issue as we think about 21st century cybersecurity when we have got the legacy IT systems in place? Mr. Venables. Thank you, Senator. I think it is a fascinating question because one of the things in my testimony you are always keen to point out was cybersecurity is tremendously important but it is not the only technology risk society faces. We have multiple different risks, not least including how we continue to maintain and update legacy systems to make sure those are equally protected with all the new systems that we are building. One of the things that is interesting, I think particularly most financial institutions, but I think many other large corporations have pretty exacting standards for change management, software quality assurance, standards for how they apply preventative maintenance to systems to reduce exactly that type of major project and major IT migration risk. The other thing that I think is worth pointing out as well is while there is a tremendous amount of focus from the financial regulators on cybersecurity, there is also still an equivalent amount of focus on change management, software acquisition and development, testing assurance, major project risk management. In fact, there is a whole shelf full of FFIEC IT examination handbooks, and quite a large number of them are about project risk and major IT migration risk, and it is certainly something that I think all major financial institutions experience quite a lot of scrutiny over not just cyber, but also their IT project risk management standards. Senator Warner. For a lot of these systems, the legacy systems, frankly, the original software vendor may not have continued to offer those systems, have not continued to upgrade them, so there are these huge vulnerabilities? Mr. Venables. I think part of the challenge, again, not just confined to the financial sector but across the world at large, is making sure you stay up to date within some reasonable window so that the older systems that may not be supported by vendors, you are not exposed to risks from those. So I think just like any other type of apparatus, you have to invest in preventative maintenance and upgrades to keep yourself within some window to manage that technology risk. Senator Warner. Anyone can address this, but my concern is because of the interconnectivity of all of your systems, aren't you only as strong as your weakest link? If a single--if an institution does not keep up, doesn't that make the whole system vulnerable? Mr. Venables. Well, not necessarily an individual institution, but certainly what we look at through the organizations we have set up, like the FS-ISAC and the FS-ARC, and also in work with the Department of Treasury and various other initiatives, we are exactly looking for those systemwide risks that could affect everybody that may be contributed by one or more elements of that, and so we are definitely focused on systemic risk. Senator Warner. I think this is probably outside the scope of the whole hearing, but to me, when we do not have a single data breach notification requirement, when we have an Equifax making as gross an error as they did and no obligation to report, or even when Yahoo has hundreds of millions outside the financial system but that is not even reportable on a SEC filing, they do not think it was material enough, I do not see how these massive failures should not fall into at least the level of a material disclosure in terms of SEC filings. So what--and I think I am down to 47 seconds, the last question. Maybe I will leave it at that and just come back to you individually, because I would like to have gotten the more macro approach of how we are going to get at this. I just came from another intel brief, classified brief. This problem is going to only exponentially grow, and I am not sure--one of the things I think particularly as we think about from both the hardware and software side, if we think about financial institutions, for example, that might be starting to purchase ZTE and Huawei equipment, you know, the vulnerabilities that we may be building into our systems because we--and this is more the intelligence community's responsibility--are not fully informing the financial sector and other sectors of some of what we now call classified problems that we have got to get out, is only going to get much, much worse. So my apologies for getting here late, to the Ranking Member, and my hope is I will have a chance to pursue some of these conversations with you individually. Yes, sir? Mr. Nelson. Senator, I would like to comment. We at the FS- ISAC, we are an information-sharing body, and we have people embedded at a top secret level at the NCCIC, the National Cybersecurity Communications and Integration Center, at DHS. So we are seeing some of that, and when we get--when it is relevant, actionable for a community, we are sharing it. Also, FS-ARC is a subsidiary, and, Phil, you are involved in that. They are doing it at a much more systemic level to see if there is any systemic impact. So we have some of that in place. I think we could do more. Senator Warner. My concern is, you know, virtually every mid-sized to larger financial institution around should have somebody that has got classified status and clearances because--and this is where I am trying to push on the intel side. The intel side has not been as forthcoming to the---- Mr. Nelson. We could use a little bit of help in getting more people classified quicker. Senator Warner. Well, the fact that there is a 74,000- person backlog is insane, and that is a national security risk that---- Mr. Nelson. I agree. Mr. Venables. Yeah, we would certainly support a much better clearance process to achieve that goal. Senator Warner. Right. Senator Brown. [Presiding.] Thank you, Senator Warner. All of us, every Senator, can submit questions to you, and the questions are due Thursday, May 31st, a week, and please, each of you, if Senators do submit questions in writing, please respond to them as quickly as you can. This concludes the hearing. Thank you for being here today. The hearing is adjourned. [Whereupon, at 10:43 a.m., the hearing was adjourned.] [Prepared statements and responses to written questions supplied for the record follow:] PREPARED STATEMENT OF CHAIRMAN MIKE CRAPO Today, we will hear about cybersecurity in the financial sector. Today's witnesses come from a wide range of organizations, and can provide us with insight on the threats faced by and the preparedness of the financial sector when it comes to cyber. Four years ago, this Committee held a similar hearing where I noted that a recently aired ``60 Minutes'' segment called 2014 ``the year of the data breach.'' Given the various data breaches over the past few years, most notably the Equifax data breach last year, I am not sure 2014 still holds that title. As our society increases its reliance on technology and becomes accustomed to immediate access to information and services from companies, the risk of--and the potential damage caused by--data breaches continually increases. Americans are becoming more aware of the amount of information, including personally identifiable information or PII, that is stored by companies and there is a growing realization that this information can be stolen or misused. The collection of PII by both the Government and private companies is something that has long troubled me. Many question how both use the data collected and how such data is secured and protected. ``The collection and use of PII will be a major focus of the Banking Committee moving forward, as there is broad-based interest on the Committee in examining this. Today, we will hear from our witnesses regarding cybersecurity and about the risks to the financial services industry and its preparedness. We have heard from many regulators before this Committee about their focus on and oversight of cybersecurity and how it is critical to the operations of companies and our markets. This is especially true for companies in the financial services space. The financial sector itself is a main target for hackers because, as many have said, ``that's where the money is.'' Banks are under constant attack every day. Because of this, they and other firms in the financial services industry have devoted substantial resources to protecting information systems, and the industry is widely viewed as one of the most advanced sectors in terms of prioritizing cybersecurity. Today, I hope to learn more about: the risks to the financial services industry from cyberattacks and cyber threats; the work being done in the financial services industry to increase cyber readiness, combat cyberattacks, and increase resiliency; and what more needs to be done by the private sector and Government to help protect companies' and consumer's information. It is critical that personal data is protected, consumer impact in the event of a breach is minimized, customers' ability to access credit and their assets is not harmed, and the financial sector is resilient enough to continue to function despite a cyber breach at a financial sector company. ______ PREPARED STATEMENT OF BILL NELSON President and CEO, The Financial Services Information Sharing and Analysis Center (FS-ISAC) May 24, 2018 Chairman Crapo, Ranking Member Brown and other Members of the Committee: Thank you for inviting me to testify at this hearing on ``Cybersecurity: Risks to Financial Services Industry and Its Preparedness.'' My name is Bill Nelson and I am President and CEO of the Financial Services Information Sharing and Analysis Center (FS- ISAC), as well as Chairman of the Global Resilience Federation (GRF) for cross-sector threat-intelligence sharing. At your request, I will cover the following topics:Current cyber-risks and threats that the financial-services industry faces; Efforts by the financial-services industry that are already underway in order to increase cyber-readiness, combat cyber- attacks and strengthen the industry from cyberthreats; and Proposed additional measures by public and private sectors to better protect companies' and consumer's information. Before I describe these, I want to provide background about the role the FS-ISAC plays in the financial sector. Three key takeaways I would like to leave you with today: Despite a dynamic and ever-changing cyberthreat environment, the financial sector has invested heavily to protect the sector's assets and consumers' information from adversaries and cybercrime; The financial sector has collaborated effectively to enhance cyber-resilience; and The financial sector continues to benefit from strong public-private partnerships that enable cyberthreat intelligence to flow through the sector and improve sector detection, prevention, and response to cyberthreats and other risks. FS-ISAC: Information Sharing to Fight Cybercrime FS-ISAC's mission is to help assure the resilience and continuity of the global financial-services infrastructure and individual firms against acts that could significantly impact the sector's ability to provide services critical to the orderly function of the economy. As such, FS-ISAC stands front and center in the face of continued cyber- attacks against our sector. FS-ISAC shares real-time threat and vulnerability information, conducts coordinated contingency planning exercises, manages rapid-response communications for cyber- and physical events, conducts education and training programs, and fosters collaboration with and among other key sectors and Government agencies. Think of FS-ISAC as a ``virtual neighborhood watch,'' where financial institutions help keep an eye out for each other. FS-ISAC was formed in 1999 in response to Presidential Decision Directive 63 (PDD 63) of 1998, which called for the public and private sectors to work together to address cyberthreats to the Nation's critical infrastructures. After the 9/11/2001 attacks, and in response to Homeland Security Presidential Directive 7 (and its 2013 successor, Presidential Policy Directive 21) and the Homeland Security Act, FS- ISAC expanded its role to encompass physical threats to the sector. FS- ISAC is a 501(c)(6) nonprofit organization and is funded by its member firms, sponsors and partners. Rapid Growth Both Nationally and Globally FS-ISAC has grown rapidly in recent years. Today, we have about 7,000-member organizations of all sizes, including commercial banks, credit unions, exchanges, brokerages and investment companies, insurance companies, payment processors and professionals, and trade associations. We also maintain close ties with other financial-industry trade associations as well as select, trusted Community Emergency Response Teams (CERTs) and Computer Security Incident Response Team (CSIRTs), law enforcement agencies, and other information-sharing initiatives around the world. The FS-ISAC is based in Reston, VA. Because today's cybercriminal activities transcend country borders, the FS-ISAC has expanded globally and has active members in 44 countries. The FS-ISAC has over 100 employees and consultants in eight countries across five continents. Financial Firms Respond to a Dynamic Threat Environment In many respects, the current threat environment feels like an ``arms race,'' and the financial sector has done a lot to enhance its individual and collective capabilities. Each day, cyber-risk evolves as attacks increase in number, pace and complexity. The financial sector has invested significantly to detect, prevent and respond to cyberthreats and other risks. Our member firms constantly adapt to this changing threat environment. At the same time, malicious cyber-actors, with increasing sophistication and persistence, continue to target the financial-services sector. These actors vary considerably, in terms of motivations and capabilities, from nation-states conducting corporate espionage or launching disruptive and even destructive attacks, to advanced cybercriminals seeking to steal money and hacktivists intent on making political statements. The financial sector (in addition to other critical-infrastructure sectors) is increasingly concerned about the possibility of attacks that could potentially undermine the integrity of critical data, or lead to the manipulation or destruction of data. This growing threat affects all institutions in our sector, regardless of size or type of financial institution (e.g., bank, credit union, insurer, payment processor or brokerage/investment firm). Tactics Used by Adversaries and Criminals to Target Financial Firms There are numerous tactics that malicious cyber-actors use to target institutions, including the following: Targeted spear-phishing campaigns, which are fraudulent emails that appear to be legitimate. These emails trick users into supplying sensitive information such as passwords that can result in the theft of online credentials and fraudulent transactions. Destructive malware attacks that impact the confidentiality, integrity and availability of data. Ransomware attacks, which involve malware that is downloaded and used to restrict access to an infected computer (often via encryption) until a ransom is paid (often in Bitcoin). Distributed-denial-of-service (DDoS) attacks, which can impede access to services for extended periods of time. Pretexting, which is built on a false narrative and establishment of trust to ultimately initiate unauthorized activity such as wire transfers. One form of this type of scheme is known as a ``business email compromise'' attack. Data breaches, which steal sensitive information including payment and account information. Supply chain threats. Insider threats. Beyond Sharing: FS-ISAC and Financial Sector Resilience Driven by the direction of our membership, FS-ISAC performs a number of key critical functions. We share threat and vulnerability information; conduct coordinated exercises; manage rapid-response communications for cyber- and physical events; produce education and training programs; and foster collaboration with other key sectors and Government agencies. We have greatly expanded our products and services to members. In particular, we have devoted a large number of resources to expand our services and tailor them to smaller financial institutions and their service providers. 1. Information Sharing FS-ISAC enables its members to voluntarily and efficiently share real-time threat and vulnerability information for cyber- and physical incidents. We delivery timely, relevant and actionable cyber- and physical threat information through email, web portal, telephone, and automated feed alerts from various trusted sources and our members. FS- ISAC maintains policies, procedures and controls to ensure that all threat information shared by members is properly gathered, stored, labeled and used in a manner that abides by related sharing agreements, privacy protections, circles of trust, member operating rules, regional requirements and governing laws. FS-ISAC cooperates with members and partner organizations, including several public-private partnerships. These include facilitating information sharing from Government partners to the FS- ISAC community and assisting members in engaging Government and law enforcement members when required. For example, an FS-ISAC employee participates in the watch floor of the U.S. Department of Homeland Security's (DHS) National Cybersecurity and Communications Integration Center (NCCIC), playing an important role in our public-private sector information and analysis sharing. The Basis for the Community: Circles of Trust We support numerous ``circles of trust'' based on roles (e.g., chief information security officers, business continuity executives, payments professionals, compliance experts) and institutions (e.g., asset managers, broker dealers, clearing houses, community banks, credit unions, payment processors). We host regular threat-information sharing conference calls for members and invite subject matter experts to discuss the latest threats, vulnerabilities and incidents affecting critical infrastructure. We organize and coordinate numerous regional member meetings, roundtables, workshops and other forums that allow face-to-face exchange between members. Our largest trust circle--the Community Institution and Association Council--includes thousands of community banks and credit unions that actively share information about threats, incidents and best practices. Since 2014, over 4,500 community institutions have joined FS-ISAC. Within this Council, member discussions and participation increased 24 percent in 2017. In the last 12 months, the FS-ISAC's industry-focused webinars on numerous topics, including protections against fraud, threat-intelligence methods and cybersecurity tools, were attended by nearly 20,000 attendees. In addition, FS-ISAC works with numerous national and State-based financial and payments organizations, including the American Bankers Association (ABA), Financial Services Roundtable (FSR), Credit Union National Association (CUNA), Independent Community Bankers of America (ICBA), National Automated Clearing House Association (NACHA) and Securities Industry & Financial Markets Association (SIFMA), as well as card payment associations, payment processors and State banking associations. 2. Creating and Invoking Playbooks for Incident Response FS-ISAC maintains the financial-services sector's ``All Hazards Crisis Response Playbook,'' which outlines the processes and considerations for identifying and responding to significant threats or events. As an example of sector-wide collaboration, this playbook was developed in conjunction with many of our members and other industry associations. We also lead sector-level crisis-response coordination and manage the Critical Infrastructure Notification System (CINS) for emergency threat or incident notifications to members. Reducing Fear, Uncertainty, Doubt Through Media Response FS-ISAC seeks to reduce fear, uncertainty and doubt through sector- level responses on significant cyber- and physical events. The FS-ISAC Media Response Team was established in 2014, following highly visible cyberattacks that impacted the financial-services sector and other sectors like retail that were broadly reported in the press. The Team's mission is to accurately assess the actual current and potential risk of cybersecurity events (as opposed to the potential media ``hype'' commonly seen) and leverage the FS-ISAC brand to properly respond to media activity using a fact-based approach. The team also strives to educate reporters and the public about cybersecurity and financial- sector practices, concepts, and terminology. 3. Always Ready: Cyber-Exercises and Incident Response Exercises are a proactive step to practice plans, find and close gaps, and better protect systems and communities. FS-ISAC began conducting exercises in 2010 with the Cyber-Attack Against Payments Systems (CAPS) exercises. FS-ISAC has since added exercises, such as drills, to test the All-Hazards Crisis Response Playbook as well as regional exercises. In 2014, we launched the ``Hamilton Series'' of exercises in collaboration with the U.S. Treasury Department and the Financial Services Sector Coordinating Council (FSSCC). These exercises simulate a variety of plausible cybersecurity incidents or attacks to better prepare the financial sector and the public sector for cyberattacks. They also aim to improve public-and private-sector policies, procedures and response capabilities. The ``Hamilton Series'' has included leaders from the U.S. Treasury Department, financial regulatory bodies, the Department of Homeland Security and law enforcement agencies. Starting in 2018, FS-ISAC added range-based cyber-exercises for more technical, hands-on-keyboard experiences to raise capability maturity levels and resiliency across the sector. Collectively, these efforts build on the strong risk-management culture within the financial-services sector, in conjunction with extensive regulatory requirements. FS-ISAC has improved its ability to respond to major cyber- and physical events, including emergency member calls regarding new vulnerabilities and threats. The last call we had had over 3,000 participants. 4. Support for the FSSCC, Sheltered Harbor, FSARC, Regional Coalitions and Other Sectors FS-ISAC supports several programs, either through direct funding or through subsidiary arrangements. These are outlined below. Addressing Policy Issues: The Financial Services Sector Coordinating Council (FSSCC). The FSSCC was established in 2002 to coordinate the development of critical-infrastructure strategies and initiatives with its financial- services members, trade associations and other industry sectors. The FSSCC works with the public sector on policy issues concerning the resilience of the sector. Members include 70 financial trade associations, financial utilities and critical-infrastructure financial firms. FS-ISAC serves as the operational arm of FSSCC, providing operational support of FSSCC initiatives. The FS-ISAC and FSSCC have built and maintained relationships with the U.S. Treasury and Homeland Security Departments, all the Federal financial regulatory agencies (e.g., Federal Deposit Insurance Corp., Federal Reserve Board of Governors, Federal Reserve Banks, Office of the Comptroller of the Currency, Securities and Exchange Commission), and law enforcement agencies (e.g., Federal Bureau of Investigation, U.S. Secret Service). Many of these public- sector agencies are part of the FSSCC's public-sector counterpart, the Financial and Banking Information Infrastructure Committee (FBIIC), which is chaired by the U.S. Treasury Department. An Extra Layer of Security for Consumer Accounts: Sheltered Harbor. Sheltered Harbor was established in 2016 as an LLC, operating under FS-ISAC's umbrella, to enhance the financial- services industry's resiliency capabilities in the event of a major disaster or event. The concept for Sheltered Harbor arose in 2015 during a series of successful cybersecurity simulation exercises between public and private sectors known as the ``Hamilton Series.'' Sheltered Harbor is based on industry-established standards and the concept of mutual assistance. Should a financial institution be unable to recover from a cyber-attack in a timely fashion, firms that adhere to the Sheltered Harbor standards will enable customers to access their accounts and balances from another service provider or financial institution. Sheltered Harbor members access specifications for common data formats, secure storage (``data vaults'') and operating processes to store and restore data and receive a Sheltered Harbor acknowledgement of adherence to the specification. As of April 2018, Sheltered Harbor membership covers more than 69 percent of U.S. retail bank deposit accounts and 56 percent of U.S. retail brokerage client assets. Systemic Risk Reduction: Financial Systemic Analysis and Resilience Center (FSARC). The CEOs of eight U.S. Government designated critical infrastructure firms--Bank of America, BNY Mellon, Citigroup, Goldman Sachs, JPMorgan Chase, Morgan Stanley, State Street, and Wells Fargo-- came together to proactively identify ways to enhance the resilience of critical infrastructure underpinning the U.S. financial system. The result was the creation of the FSARC as a subsidiary of the FS-ISAC. Shortly after the FSARC was founded, an additional eight financial institutions, including the key financial market utilities identified by the U.S. Department of Homeland Security as operators of essential critical infrastructure, joined the FSARC as member firms. The FSARC's mission is to proactively identify, analyze, assess and coordinate activities to mitigate systemic risk to the U.S. financial system from current and emerging cybersecurity threats. This is accomplished through focused operations and enhanced collaboration between participating firms, industry and Government partners. Key FSARC functions include: 1) Identifying operational risks associated with systemically relevant business processes, functions, and technologies underpinning the financial sector (collectively ``Identified Systemic Assets''); 2) Developing resiliency plans to address those risks; 3) Working with critical-infrastructure operators and the U.S. Department of Homeland Security, intelligence and defense communities to deliver strategic early warnings of attack on Identified Systemic Assets; 4) Working with law enforcement agencies to disrupt sophisticated malicious actors that may pose a systemic risk to the sector over time or may be targeting Identified Systemic Assets. Thinking Nationally, Acting Locally: Regional Coalitions. Financial institutions in more than a dozen areas participate in the ``FIRST'' (Fostering Industry Resilience and Security through Teamwork) movement through the formation of public-private partnerships focused on Homeland security and emergency management issues with the public sector. Each coalition provides the opportunity for members to collaborate with one another and with Government at all levels about issues of resilience and security. FS-ISAC has established regional coalitions in the Northeast (Connecticut, Maine, Massachusetts, New Hampshire, New Jersey, New York, Rhode Island and Vermont), Mid-Atlantic (District of Columbia, Delaware, Maryland and Northern Virginia) and California (San Francisco, Fresno and Los Angeles). Through regional coalitions, FS- ISAC learns the ground truth about the local effects of crises, while the coalitions obtain national-level crisis and threat information from FS-ISAC. FS-ISAC also supports RPCfirst, an umbrella organization for all of the regional coalitions across the Nation. Cross Sector Collaboration and Sharing The FS-ISAC collaborates with other sectors, including the National Council of ISACs (NCI). Formed in 2003, the NCI today comprises 24 organizations designated as their sectors' information sharing and operational arms. Last year, the FS-ISAC spun off its Sector Services division into a new standalone, not-for-profit called the Global Resilience Federation. I serve as the chairman of GRF, which is an information-sharing hub and intelligence provider. GRF develops and distributes cyber-, physical and geo-political security information among not-for-profit ISACs, ISAOs, CERTs and other information sharing communities across vital sectors around the world. The company assists in the creation and operation of ISACs and ISAOs, or, if requested, support for the expansion of existing communities. This ``community of communities'' was founded by charter members--FS- ISAC, Legal Services Information Sharing and Analysis Organization (LS- ISAO) and Energy Analytic Security Exchange (EASE)--and has since been joined by National Health ISAC, Oil and Natural Gas ISAC, Multi-State ISAC, Retail Cyber Intelligence Sharing Center and National Retail Federation. As a cross-sector hub that also works with Government and industry partners, GRF facilitates and supports cross-sector intelligence sharing as well as collaboration. Regulatory Requirements and Risk Management Culture The financial sector has historically led the way in making substantial investments in not only security infrastructure and highly qualified experts to maintain the systems, but also in driving collaboration across industries and with the Government. Financial institutions recognize that customers trust them to protect their investments, their records and their information. Individual financial institutions invest in personnel, infrastructure, services and top-of- the-line security solutions and protocols to protect their customers and themselves, and to respond to cyber-attacks. These investments protect the individual institutions and their customers, but on its own, an individual institution generally only has the ability to protect what is within its control. Financial institutions, however, are interconnected to each other, with other sectors and with the Government. This reliance on others gives the financial-services sector a unique and critical role in the cyber-landscape and requires coordinated action for the most effective response. Recognizing the cyberthreat environment continues to expand in complexity and frequency, and that individual institution efforts alone will not be enough, executives from the financial-services sector have stepped up efforts to work together. Cybersecurity Practices Often Burdened by Regulation and Supervisory Oversight Financial institutions are subject to comprehensive regulations and supervisory requirements with respect to cybersecurity and the protection of sensitive customer information as well as business resiliency. For example, Title V of the Gramm-Leach-Bliley Act of 1999 (GLBA) directed regulators to establish standards for financial institutions to protect customer information. Pursuant to GLBA, regulators have imposed broad information security requirements for regulated financial institutions with strong enforcement authority. In addition to issuing regulations almost two decades ago, the Federal financial regulators have issued extensive ``supervisory guidance'' through the Federal Financial Institutions Examination Council (FFIEC) that outlines the expectations and requirements for all aspects of information-security and technology-risk issues, including authentication, business continuity planning, payments and vendor management.'' Among the obligations to secure systems and protect data under GLBA and supervisory guidance, financial institutions must: Develop and maintain an effective information-security program tailored to the complexity of their operations; Conduct thorough assessments of the security risks to customer information systems. Oversee service providers with access to customer information, including requiring service providers to protect the security and confidentiality of information; Train staff to prepare and implement information-security programs; Test key controls, systems and procedures, and adjust key controls and security programs to reflect ongoing risk assessments; Safeguard the proper disposal of customer information; and Update systems and procedures by taking business changes into account. Many Regulations and Standards with Which to Comply Financial institutions must comply with cybersecurity requirements and guidance from numerous regulatory bodies depending on their charter and activities. What's more, depending on the type of financial institution, organizations may have additional compliance and nonregulatory standards; for example, institutions that handle payment information also are required to comply with nonregulatory standards, such as the Payment Card Industry Data Security Standard (PCI-DSS). This adds to the compliance burden of financial institutions, as well as that of merchants and other organizations that handle payment information. Most recently, the FFIEC issued the Cybersecurity Assessment Tool (CAT)--an assessment tool designed to help smaller institutions, in particular, identify their risks and determine their cybersecurity preparedness. The CAT provides a repeatable and measurable process for financial institutions to measure their cybersecurity preparedness over time and aligns with the NIST's Cybersecurity Framework. In 2016, the FS-ISAC and FSSCC leveraged the FFIEC's CAT to produce a ``crowd- sourced'' version that incorporated automation to assist financial institutions in utilizing the FFIEC document. Recommendations to Further Protect Financial Institutions and Customers Finally, you asked me to describe what more needs to be done by the private sector and the Government to help protect companies' and consumers' information. For many years the financial sector has been working diligently and collaboratively to make significant improvements in five major areas: Enhance Information Sharing Improve Strategic and Tactical Analytics Improve Crisis Management Response and Coordination Improve Core Components of the Cyber Eco-system through R&D Improve Executive Communication and Advocacy The financial-services sector has made significant progress in all of these. In so doing, the financial sector has developed strong collaborative relationships with numerous Government agencies (including law enforcement, DHS, Treasury, and U.S. regulatory agencies). These efforts have enhanced the resiliency of the financial- services sector. We also have worked closely with other ``critical infrastructure'' sectors (e.g., telecommunications, energy) to enhance their capabilities and to address interdependencies. While we are making good progress, much more work needs to be done. The following are four major recommendations. Some of these recommendations were developed in collaboration with the Financial Services Sector Coordinating Council (FSSCC) and publicly released in early 2017. 1. Encourage Regulators to Harmonize Cyber-Regulatory Requirements. Given that financial institutions are subject to numerous regulatory and supervisory requirements with respect to cybersecurity, protection of sensitive customer information, business resiliency, penetration testing, vendor management, etc., there is little need for additional regulation in this space. Instead, there is a need to reduce the burden of implementing regulations for financial firms. What the sector most needs now is a focused and coordinated effort among State, Federal, and global regulators to harmonize regulatory requirements. In so doing, this is a good opportunity to leverage the National Institute of Standards and Technology (NIST) Cybersecurity Framework. While regulatory requirements are a powerful and effective way to ensure that financial institutions have adequate controls in place, a growing challenge facing large and global financial institutions today is the need for greater coordination and harmonization among the regulatory agencies, within the United States and globally. This will help financial firms keep pace with new threats, new financial business process models, and the necessary skillsets to evaluate the intersection of those two for security and resiliency purposes. A common refrain we hear from senior executives and practitioners in large and global firms is the need for regulators to harmonize regulatory requirements at both the policy and examination levels to reduce unnecessary regulatory compliance burdens and to better focus limited resources to mitigate cyber-risks. In addition, it would help if the U.S. Congress and Administration enacted a consistent and strong data protection and breach notification law across State and national platforms. Related to this recommendation to harmonize regulatory requirements, we also encourage Congress and regulatory rulemaking bodies to integrate cyber-risk assessment into the legislation and rulemaking processes. Hence, Congress and regulatory rulemaking bodies should weigh the implications of concentrating sensitive data that will create new cyber-targets when evaluating potential legislation and rulemaking. The potential aggregation of personally identifiable information via the SEC Rule 613 Consolidated Audit Trail or retrieving highly sensitive penetration testing and vulnerability data on regulated institutions are examples of situations where care should be taken to avoid creating new risks and creative solutions should be sought collaboratively with industry. 2. Leverage Authorities in the Cybersecurity Information Sharing Act of 2015 (CISA) and USA Patriot Act of 2001 to Implement More Effective Information Sharing Programs. FS-ISAC and others in the financial sector supported the enactment of the Cybersecurity Information Sharing Act of 2015 (CISA). CISA encourages sharing for a cybersecurity purpose and includes incentives to entice entities to share information, including protection from liability claims, exemption from disclosure laws and regulatory use, and antitrust exemption. CISA enables sharing of information including: malicious reconnaissance, methods to defeat controls or exploit vulnerabilities, security vulnerabilities, malicious cyber-command and control, exfiltration of data and other attributes related to cyberthreats. Mandated by the Cybersecurity Act of 2015, the Department of Homeland Security (DHS) developed a system to automate the sharing of threat indicators on a machine to machine basis. This system is called Automated Indicator Sharing or AIS and was put into service in 2016; it is free to use. AIS leverages two internationally recognized standards for sharing: One is the data standard called Structure Threat Information Expression (STIXT) and the other is the delivery standard known as Trusted Automated eXchange of Indicator Information (TAXIIT). Threat indicators include data like malicious IP addresses, email addresses associated with ransomware, phishing or social engineering attacks, known cybercriminal campaign information and much more. Representing its members, the FS-ISAC agreed to participate in the Automated Indicator Sharing (AIS) program on a trial basis in 2016. We have engaged in numerous collaborative technical discussions with DHS and Treasury concerning the AIS program over the past 2 years. FS-ISAC and member firms have provided direct and consistent feedback to DHS regarding the early implementations of the AIS program. This feedback includes the need for DHS to strongly structure vetting of AIS participants, the need to verify the integrity of data transmitted and received within AIS, and the importance of providing context around the information. DHS has indicated it has heard the financial sector's feedback and is taking steps to incorporate that feedback and has recently committed to delivering on improvements that add context to indicators, includes rated scoring of vetted sources, utilizes the latest version of STIX/TAXII standards, and ability for AIS recipients to screen sources and receive data only from sources that each recipient approves. We also encourage our U.S. Government partners to improve response time and the quality of shared information and analysis and to prioritize essential ``lifeline'' sectors in planning and event response. Focus Federal resources to assist those sectors whose operation is fundamental to the national defense and economy, such as financial services, electric power, and telecommunications, to mitigate against cyberthreats and to help in recovery. Continued private-public collaboration is required to develop the list of cyber-defense capabilities that can be used to respond to a significant cyber- incident affecting the Nation's critical infrastructure. Ensure that the relevant members of the lifeline sectors receive the appropriate security clearances. Also, seek improvements in sharing classified information, passing clearances and collaborating with the private sector in a classified environment. Together with the communications sector and the electricity subsector, FS-ISAC led the development of a playbook for lifeline sectors, completed earlier this year. We began drilling it during Cyber Storm and the National Level Exercise and plan a Hamilton Series tri-sector exercise for it in the fall. One of the next steps involves expanding the lifeline sectors for which it would be applicable. Another is ensuring that the tri-sector playbook connects with plans the Federal Government would use during a significant incident. The U.S. Departments of Treasury, Homeland Security and Energy have seen the playbook, though further Government socialization and coordination remains. In addition, we encourage the U.S. Government to invest further in financial services-supporting infrastructure and risk-based cyber R&D. To ensure strong investment in the cybersecurity and resiliency of key Federal organizations, processes and systems essential to the functioning to the financial services system, it's important for the U.S. Government to assign clear responsibilities and increase significantly resourcing for efforts to detect, analyze and mitigate cyber threats to the financial system. This includes a dedicated effort within the Intelligence Community and an operational-level contingency planning, indications/warnings, and exercises program. It's important to fund cybersecurity defense and R&D initiatives commensurate with the risk that cybersecurity threats pose to the Nation's security, including funding to identify risks and mitigation techniques for emerging Internet of Things (IoT) and quantum computing technologies. Finally, we encourage the Financial Crimes Enforcement Network (FinCEN) to provide greater clarity on legal protections for financial institutions that want to share information in accordance with the USA Patriot Act. On November 30, 2016, FinCEN participated in a FS-ISAC- sponsored webinar about information sharing on suspected money laundering. This interaction helped anti-money laundering (AML)- regulated financial institutions better understand FinCEN's views of the potential risk mitigation opportunities available by sharing information about suspected money laundering under section 314(b) of the USA Patriot Act. Since the webinar, many of the financial institution executives who participated in the webinar, which was open to all AML-regulated financial institutions, have asked for written confirmation of the information that FinCEN officials provided verbally. Financial institutions indicated that written confirmation is necessary to encourage financial institutions to leverage the authority provided under section 314(b) of the USA Patriot Act. If FinCEN provides written guidance about what suspected money laundering and terrorist financing information can be shared with an association of approved financial associations under the USA Patriot Act Section 314(b), then financial institutions that are members of an approved 314(b) sharing information association would file Suspicious Activity Reports (SARS) with more actionable information. In turn this might enhance the U.S. Government's efforts to investigate, extradite and prosecute transnational cyber criminals. FS-ISAC provided a list of six questions and our understanding of the answers to FinCEN on numerous occasions and is still waiting for a response. FS-ISAC would like to request that FinCEN publicize the answers so financial institutions can reference these answers. This would provide financial institution executives with much needed assurances of FinCEN's views and thus encourage greater information sharing about suspected money laundering by financial institutions pursuant to section 314(b) and other U.S. laws that authorizing the sharing of suspected money laundering and suspected terrorist financing. 3. Establish Cyber-Deterrence and Response Capabilities and Encourage Adoption of Global Cybernorms. The Congress and Administration should articulate how the U.S. Government will respond to certain types of attacks and how these actions might impact the financial-services sector and other critical infrastructure sectors. The U.S. Government should also increase efforts to extradite and prosecute cyber criminals. Attacks on the financial services industry and critical infrastructure should be considered a violation of an explicit global norm; violations of this norm should be pursued vigorously. The U.S. Government should also enable and expand cross- sector, real-time and actionable cyber threat information sharing and situational awareness. The U.S. Government should also continue to engage with the global community to develop and adopt international norms of behavior that discourage targeting of financial institutions and other critical-infrastructure sectors. 4. Support Efforts to Develop a Technology-Capable Workforce. The U.S. Government should partner with the private sector and academia to develop education and training programs to meet the business needs of today and tomorrow in addressing the significant shortage of cyber security professionals and the education system in producing enough skilled cybersecurity professionals. CONCLUSION The financial sector has made a significant investment in cybersecurity, risk reduction and resilience. However, threats, vulnerabilities and incidents affecting the sector continue to evolve. Individual firms have responded by making significant investments in technology and risk reduction improvements at their respective companies. Collectively, the sector has made improvements in information sharing and made strides in focusing on systemic risk, mutual assistance, enhanced resiliency and consumer protection. While more needs to be done, including additional collaboration with Government and global partners, the financial sector is making good progress and on balance has invested heavily to protect the sector's assets and consumers' information from adversaries and cybercrime. ______ [GRAPHICS NOT AVAILABLE IN TIFF FORMAT] PREPARED STATEMENT OF PHIL VENABLES Chief Operational Risk Officer, Goldman Sachs May 24, 2018 Chairman Crapo, Ranking Member Brown, and other Members of the Committee, thank you for inviting me to testify at this hearing on Cybersecurity: Risks to Financial Services Industry and Its Preparedness. I appreciate the Committee's focus on such an important issue. My name is Phil Venables; I am the Chief Operational Risk Officer of Goldman Sachs. I have been with the firm 18 years and my first 16 years at the firm I was Chief Information Security Officer before moving into a wider role in our Risk Division. Today, I am going to provide my perspective on the cyber-threats the financial sector faces, the broader technology risk landscape, the need for shared defenses and what can be done to keep improving the security and resilience of the financial system. A number of factors are contributing to increased inherent risk across the sector including, but not limited to, the increased digitalization of financial services and the globally interconnected nature of the financial system. The same trends that are increasing benefits of a global financial system are also bringing on these new and enhanced risks. First on threats, it will probably come as no surprise that the financial sector, globally, is targeted by a wide range of cybersecurity threats including from organized criminal groups with financial motivation as well as nation states for a broad array of reasons. Additionally, it is worth reminding ourselves that cybersecurity is not the only risk to information or technology systems. Risks posed from software errors, misconfiguration, outages and other resiliency issues can also cause as much impact as cybersecurity events. It is critical to have shared defenses across the financial sector so that all institutions, large and small, can learn from each other's best practices and so that threat information can be shared among firms, reducing the likelihood attackers can execute their strategies without response. We have a long history of robust information-sharing processes, with the FS-ISAC acknowledged as a preeminent example of such capability. Additionally, we have established tighter coupling between systemically important institutions through the Financial Systemic Analysis and Resilience Center, the so called FS-ARC. In addition, the sector's coordinating council under the Department of Treasury's leadership have proved instrumental in increasing sector resilience. Formalized sector-wide drills and exercises have spawned other initiatives, like Sheltered Harbor--an approach for firms to ensure the maintenance of immutable data vaults. Turning our attention to regulators and regulation, we benefit from a number of strong regulators across the financial sector that stipulate cybersecurity and other controls that reduce the risk of major incidents. This includes regular examinations and reviews. We continue to support the need for harmonization of regulation, domestically and globally, and we commend the efforts to date on the use of the NIST Cybersecurity Framework. Additionally, we should be watchful for unintended detrimental consequences to cybersecurity from noncybersecurity legislation or regulation. Notwithstanding the strong relationship on this issue between the public and private sectors, we continue to examine ways to enhance coordination. For instance, there is room for improvement in the responsiveness to financial sector Requests for Information. The establishment of the DHS National Cybersecurity and Communications Integration Center (NCCIC) in 2009 created the ability to have financial sector representatives in a cleared, collaborative space working directly with partners from Government and other industries for common purpose. Collaboration, engagement, responsiveness, between and among DHS, other U.S. Government and industry partners continues to improve as relationships build and partners are better able to understand each other's information needs. We would propose that metrics be established between the Government and financial sector to quantify and validate the flow, value and timeliness of information shared between the financial sector and public sector to quantify the state of these relationships. Despite all this coordination and response to cybersecurity threats, risk still remains and we need to continue to be vigilant to adjust the defenses of individual firms and the sector as a whole by making sure we adopt innovative approaches to protecting customer data and services as well as designing for resilience to reduce single points of failure and single focal points of attack. Finally, I would recommend all organizations that operate critical public services or protect customer data adopt strong defenses and security programs based on, at a minimum, the following approaches: 1. Integrate cybersecurity into the fabric of organizations--from business risk management processes, strategy and product development to the foundation of how the technology is built and operated, including planning for resilience in the face of attacks. Sustaining cybersecurity is a first class business risk along with all other risks--beginning with the Board and executive leadership and through all levels of the enterprise. 2. Improve capabilities amongst people, process and technology. There needs to be continued emphasis on the embedding of controls into critical technology products and services: we need secure products, not just security products. We should recognize that cybersecurity risk mitigation is not solely the responsibility of designated cybersecurity professionals but is, perhaps more importantly, in the domain of leadership, risk managers and engineers at all levels of organizations. I would support a national program to embed cybersecurity training into all academic and professional training and qualifications: we need more security-minded people, not just more security people. I fully endorse efforts to deal with the shortage of trained cybersecurity professionals to help manage these risks, but I also note that there is a wider issue related to the productivity of the cybersecurity professionals we already have and more needs to be done by Government and industry to improve tools, processes and the orchestration of defense across multiple platforms to get the most out of those people. 3. Design for defensibility. Our goal should be to design our technology and information processing environments to be more inherently defendable and resilient in the face of attacks, and we have to keep examining our global supply chains for security issues and excess concentration risk on specific services or geographies. Thank you again Mr. Chairman for allowing me to provide this input into this important process and we remain committed to assisting further as needed. I'm happy to answer any questions you or the other Members may have at this time. ______ PREPARED STATEMENT OF CARL A. KESSLER III Senior Vice President & Chief Information Officer (CIO) First Mutual Holding Co. May 24, 2018 Chairman Crapo, Ranking Member Brown and distinguished Members of the Committee, thank you for the opportunity to testify before you today. I am pleased that the Committee continues to place a focus on cybersecurity risks and their implications to the financial system, businesses, and consumers. As Chief Information Officer of a holding company comprised of several mutual community banks, I will share the unique perspective of community banks on cybersecurity regulation, information sharing, community bank collaboration and customer transparency. Cybersecurity Regulation Two key regulatory changes have positively improved the approach of community banks in managing cybersecurity risks. In the wake of the Dodd-Frank Act reforms, supervision of our affiliate banks migrated from the Office of Thrift Supervision (OTS) to the Office of the Comptroller of the Currency (OCC). The OCC has been consistent and adamant in raising all bank's readiness to address cybersecurity risks. Their outreach and guidance have yielded vast improvements in the cyber posture of community banks. In the last few years, the Federal Financial Institutions Examination Council (FFIEC) established the Cybersecurity Assessment Tool (CAT) for evaluating cyber controls in a uniform way among depository institutions. Both regulatory actions have created a firm, but fair, supervisory approach in responding to emerging threats. While some may question these changes on the grounds of cost and a ``one size fits all approach,'' it is indisputable that regulatory oversight protects both the banking system and the consumers. We have found that the regulators apply the FFIEC CAT tool in a manner consistent with the risk a bank poses. I believe that cybersecurity defenses and monitoring systems are integral infrastructure investments akin to those community banks have traditionally made in physical security safety. I encourage this Committee to continue its work with prudential regulators on these important matters. With respect to OCC supervision and the advent of the FFIEC CAT, I understand both the perspectives of regional banks and community banks, having served in leadership capacities in both. I am pleased regulators use the same information technology (IT) examiners and general framework at institutions of all sizes. These examiners possess a strong understanding of cybersecurity risks and the controls deployed to protect banks and consumers. For any institution there is an inherent baseline of risk and a set of fundamental controls needed to protect consumer information. The approach of using dedicated IT examiners and practices fosters continuous improvement in preventing and detecting cybersecurity threats at institutions of all sizes. At the same time, this approach also leads to ongoing dialogue with regulators. How much risk does our community bank present? What is most critical for the protection of our bank, our customers and our financial system? How should cybersecurity investment dollars be deployed? The FFIEC CAT helps institutions frame these risk questions. First, it provides a standard way to assess how much inherent risk an institution generates. Second, the FFIEC CAT provides guidelines for what controls might be appropriate to mitigate those risks. After completing our holding company's assessment in 2015, we concluded that our existing information security program was well- aligned to the baseline expectations of the FFIEC CAT and, in fact, exceeded them. Subsequent actions focused our cybersecurity investment strategy to attain compliance with our level of risk and to address new threats as they arise. Prudential regulation in conjunction with the FFIEC CAT is important to our bank's cyber readiness. Highly trained examiners are critical to administering the CAT. Because of the nature of the threat environment and the rapidly evolving domain of cybersecurity controls, an exam is never a static, check-the-box activity. It is always a dynamic conversation. My recommendation to this Committee is to ensure the consistent availability of highly trained IT examiners whose skills are in high demand in both the public and private sectors. Another consideration for the Committee is to ensure that similar cybersecurity rigor exists among nonbank financial services companies. How do we safeguard customer data at companies outside the oversight of prudential regulators? Information Sharing As the cyber threat landscape evolves, a critical enabler is timely access to information sharing of active threats with community banks, through public and private partnerships. To address the Committee's question of ``what more needs to be done by the private sector and Government to help protect companies' and consumers' information,'' we must first identify where the significant risks lie. According to the Independent Community Bankers of America (ICBA), 99.5 percent of all banks are community institutions, half of which have assets under $250 million.\1\ Almost all community banks do not operate an in-house transaction processing center. In other words, most community banks do not process customer transactions in their own data centers. They rely on a network of third-party service providers to deliver banking services. While maintaining primary accountability for safeguarding consumers' information, we rely on third-party providers including core processors, payments networks, and larger banks. --------------------------------------------------------------------------- \1\ See ICBA Stats & Facts available at http://www.icba.org/go- local/why-go-local/stats-facts. --------------------------------------------------------------------------- Only a few core processors provide IT services, such as customer transaction processing, mobile banking, and Bank Secrecy Act/Anti-money Laundering solutions. All banks interact through networks (ATM, debit card, and ACH) which are the backbone of the payments system. Some large banks provide processing for community banks through white labeled correspondent services. Although community banks represent the largest segment of banks in number, the risks associated with technology operations are aggregated in the data centers of just a few core processors,\2\ payments networks and large banks. --------------------------------------------------------------------------- \2\ The top three core processors hold a 70 percent market-share although how much of that is conducted in their data center versus the banks' data centers is unclear. https://bankinnovation.net/2018/02/ fiserv-has-largest-u-s-marketshare-of-top-bank-core-processors/. --------------------------------------------------------------------------- Clearly, this concentration of IT services provides both advantages and challenges for managing community bank cybersecurity. The advantage is that through scale, the large service providers have more resources to address cyber threats. An additional benefit could also be realized if these providers acted transparently and shared cyber threat information with industry partnerships like the Financial Services Information Sharing and Analysis Center (FS-ISAC) and with their community bank clients. Core processors are active acquirers of technology companies and continually roll out new products. Although a core processor's information security plan may be sound today, each new acquisition introduces its own risk \3\ into the environment. Thus, risk is constantly shifting within a core provider, and by extension to community banks and consumers. --------------------------------------------------------------------------- \3\ In April, American Banker ran this story ``BankThink Banks are from Mars, fintechs are from Venus: Bridging the matchmaking gap'' by Terry Ammons which does a good job of representing the risks of a fintech acquisition; available at https://www.americanbanker.com/ opinion/banks-are-from-mars-fintechs-are-from-venus-bridging-the- matchmaking-gap. --------------------------------------------------------------------------- I know our core processor is reviewed regularly by the OCC and FFIEC. We have limited access to the results of these reviews. If a bank were in the center of a significant event like a contract renewal or if there were a security breach in the recent past, the bank can request additional information. Community banks also have access to third-party audits conducted on a core processor's controls. Such a report is limited and only communicates if a core processor's controls are deemed effective. The actual number of breaches is typically not disclosed. Thus, a community bank must trust that if there is a significant pattern of breaches, its regulator will ensure that the causes are identified and remediated. The only way to know if a breach has occurred is if the bank is directly impacted or if the breach is significant enough to result in a news story that names a bank that happens to use that same service provider. Although these third parties are the stewards of our customer's information, we have very little insight into their overall security performance. In summary, law and regulation require banks to monitor closely the effectiveness of their service provider's controls related to cybersecurity and protecting nonpublic customer information. The current system relies on a high degree of blind trust in a service provider with limited transparency. This opaque approach runs contrary to best practices in information sharing and vendor management. To partially compensate for this lack of transparency, banks I manage use a third party to track the information security performance of critical providers. My desire is more transparency in how service providers protect our customer information. For example, one solution might be to create a cybersecurity scorecard aggregating data from many sources including regulatory reviews. Such an approach must be carefully weighed against a chilling effect on information sharing. This scorecard, properly executed by a trusted third party, would enable banks to make better choices as they select vendors and create positive momentum toward control improvements. It is important to explain what ``information sharing'' and ``transparency'' mean to a community bank. The key for banks is that a comprehensive ecosystem of financial services providers shares threat information in real time to an entity qualified to analyze, verify, and communicate it immediately to a bank where it can be used to adapt its controls. FS-ISAC pioneered this kind of service and our bank was an early adopter. Upon validation of a threat by FS-ISAC, critical information such as the internet address of the attacker was automatically sent to our firewalls and blocked. This solution required our bank to setup a duplicative connection. Our ideal solution involves a close partnership between banks, our third-party service providers, a trusted third party and our security provider so that threats flow immediately to us via the existing mechanisms we have in place. The goal is to respond in seconds or minutes rather than days or weeks. The most critical factor in thwarting a cyberattack is speed. The technology continues to improve as machine learning and artificial intelligence become more prevalent. The technology though cannot act on data it does not have. Important questions remain regarding if, when, and how businesses can share threat and/or breach information. In my conversations within the industry, there is still a great reluctance to share information. Liability, contract and privacy concerns are the most often cited reasons. I would suggest this is a good time to reexamine the effectiveness of cyber security law particularly as it affects information sharing. Timely information sharing is foundational to the industry's ability to combat a cyber threat. It may be worthwhile to require that service providers share threat and breach information with an authorized, trusted third party. In consideration for this sharing requirement, this Committee could consider expanding safe harbor liability provisions for third parties who meet certain strict requirements. This would clearly enhance consumer information protections. Community Bank Collaboration I would like to share a few unique and not-so-unique actions we have taken to help protect our customers. Established in 2015, our mutual holding company was founded on the belief that strong independent banks play a vital role in our communities. As Ohio's largest independent, depositor-owned entity, we are faced every day with the cost, complexity and capacity required to implement an effective information security program. We believe that our holding company model leverages these capabilities with our affiliate banks in a manner that they otherwise could not afford, design, or staff. In our three affiliations we have preserved a local banking presence, improved security controls and done so at a minimal marginal cost for the holding company. This proves the cost savings for individual small banks is a game changer. We believe this is a real, practical example of the kind of collaboration envisioned by the OCC in their January 2015 paper ``An Opportunity for Community Banks: Working Together Collaboratively.''\4\ --------------------------------------------------------------------------- \4\ https://www.occ.treas.gov/publications/publications-by-type/ other-publications-reports/pub-other-community-banks-working- collaborately.pdf. --------------------------------------------------------------------------- Customer Transparency Finally, when talking about transparency and information sharing, we tend to focus on companies and Government entities. In all instances however we need to put the consumer at the center of this discussion. We are encouraged by the ability of technology to empower our customers. For example, many of us receive real-time alerts regarding our debit cards or when our credit report changes. I know this hardly seems to address ``what more needs to be done,'' but keep in mind it's always about improving the speed at which we can detect and react to a threat. Giving consumers the tools and access to information makes us all safer. Transparency and information sharing with the consumer is paramount. A key challenge for banks is the complexity of customer notification and privacy laws that exist today. While clearly needed, the simplification and modernization of the relevant laws and regulations can enable information sharing and therefore enhance consumer protections. Certainly, any solution must guard against shifting the liability to consumers from those who failed to protect their data. Conclusion Key takeaways: Continue supporting the regulatory review process and the FFIEC CAT Encourage transparency regarding the effectiveness of the security programs of the third-party service providers in our financial system including nonbank entities Review the effectiveness of current cybersecurity law with a focus on information sharing Review how the existing complexity of customer information and privacy protections laws may be slowing down the exchange of critical threat information Encourage community banks to collaborate Engage and empower the customer as a valued part of the cybersecurity solution The best way to protect consumers is to increase transparency and information sharing within the financial services cybersecurity ecosystem. This Committee can help move this forward by encouraging the transparency of the performance of third-party service providers. You can also help by passing legislation which further encourages information sharing so that active threats are identified and mitigated in minutes. Thank you for the opportunity to testify before you today. I stand ready to work with you in any way that I can to protect consumers and our financial system and look forward to answering your questions. ______ [GRAPHICS NOT AVAILABLE IN TIFF FORMAT] RESPONSES TO WRITTEN QUESTIONS OF THE SENATE BANKING COMMITTEE FROM BILL NELSON Q.1. Mr. Nelson, in your written testimony you requested greater clarity on legal protections for financial institutions that want to share information in accordance with the Patriot Act. What clarity would you like to see? A.1. Under section 314(b) of the USA Patriot Act, financial institutions may share information when there is suspicion of money laundering and terrorist activity. This authority provides financial institutions with an opportunity to reduce money laundering and terrorism financing. However, doing so necessarily involves sharing personally identifiable information, such as names and account information. In the absence of specific legal guidance regarding the manner in which such information may be shared, banking attorneys have limited sharing to those instances in which money laundering or terrorist activity can be confirmed. It would be preferable to share such information earlier in the process, but liability concerns preclude it. For example, in the case of suspected money mule activity associated with business email compromise, banks have questioned FinCEN if payment information can be shared between approved financial institutions and an approved association of financial institutions under the safe harbor of section 314(b). FinCEN has responded verbally that this information can be shared and encouraged the sharing to provide more complete information in SAR filing. FinCEN has not provided written guidance to this question. Sharing the information in this example by a large network of FinCEN-approved financial institutions would reduce risk to the financial institutions and their customers. Federal law enforcement would benefit from more complete SAR filing information that will lead to more effective investigations and prosecution of cyber criminals. Q.2.-Q.3. A year and a half ago, William and Margaret Frederick sold their home in Ohio so they could buy a home in Las Vegas, Nevada. The couple expected to make a $216,000 profit on the sale. But, their real estate agent read a hacked email supposedly from William--the fake email had three L's in Bill instead of two--and sent the profit to the hacker. William was 83 and Margaret 77. Someone stole the money they intended to live on in retirement. Real estate transaction fraud is a problem in Nevada and nationwide. Thieves wait for the right time to impersonate a bank or realtor and send you different wire transaction instructions. Estimates are as much as $400 million a year in losses. What more can financial institutions do to prevent thieves from stealing people's down payments, earnest money and even the entire home payment if someone is buying a home for cash? Please identify the best practices for realtors, title agents and mortgage brokers? One way to protect consumer's information is to not collect it. For example, why should merchants of any sort, including doctors, insurance companies and utilities, require social security numbers as part of their information or data-set on their customers? Should we limit Social Security numbers provided to merchants? A.2.-A.3. In this example, it appears that criminals, using money mules to launder the funds, stole the money. When banks discover this type of potentially criminal activity they are required to file Suspicious Activity Reports (SAR) with FinCEN. While banks want to share this suspicious activity within a network of FinCEN-approved financial institutions under the protections of section 314(b) of the USA Patriot, some banks are reluctant to share this suspicious activity because FinCEN has not provided written guidance. If banks had network intelligence about active money mule accounts in the Nevada case, the money transfer to the criminals may have been delayed and investigated by the bank staff. A bank investigation could then lead to the money transfer being stopped. Closing attorneys, mortgage brokers and title companies should be encouraged to join an ISAC for their industry. Given that criminals change tactics regularly, it's helpful for communities to share information about these tactics and effective risk mitigation measures. This ``strength in sharing'' approach goes a long way in protecting the companies and their customers. In addition, collaboration with law enforcement agencies are also effective in educating the community and sharing tips. For example, the FBI's Internet Crime Complaint Center (IC3) has published numerous publications, including this one in May 2017 on tactics for defending against business email compromise (BEC): https:// www.ic3.gov/media/2017/170504.aspx. The recommendations below come from the IC3 report referenced in the link. Businesses with an increased awareness and understanding of the Business Email Compromise (BEC) scams are more likely to recognize when they have been targeted by BEC fraudsters. Therefore, they are more likely to avoid falling victim and sending fraudulent payments. Businesses that deploy robust internal prevention techniques at all levels (especially for front line employees who may be the recipients of initial phishing attempts) have proven highly successful in recognizing and deflecting BEC attempts. Some financial institutions reported holding their customer requests for international wire transfers for an additional period of time to verify the legitimacy of the request. The following list includes self-protection strategies: LAvoid free web-based email accounts: Establish a company domain name and use it to establish company email accounts in lieu of free, web-based accounts. LBe careful what you post to social media and company websites, especially job duties and descriptions, hierarchal information, and out-of-office details. LBe suspicious of requests for secrecy or pressure to take action quickly. LConsider additional IT and financial security procedures, including the implementation of a two-step verification process. For example: LOut-of-Band Communication: Establish other communication channels, such as telephone calls, to verify significant transactions. Arrange this two- factor authentication early in the relationship and outside the email environment to avoid interception by a hacker. LDigital Signatures: Entities on each side of a transaction should utilize digital signatures. This will not work with web-based email accounts. Additionally, some countries ban or limit the use of encryption. LImmediately report and delete unsolicited email (spam) from unknown parties. DO NOT open spam email, click on links in the email, or open attachments. These often contain malware that will give subjects access to your computer system. LDo not use the ``Reply'' option to respond to any business emails. Instead, use the ``Forward'' option and either type in the correct email address or select it from the email address book to ensure the intended recipient's correct email address is used. LBeware of sudden changes in business practices. For example, if a current business contact suddenly asks to be contacted via their personal email address when all previous official correspondence has been through company email, the request could be fraudulent. Always verify via other channels that you are still communicating with your legitimate business partner. LCreate intrusion detection system rules that flag emails with extensions that are similar to company email. For example, a detection system for legitimate email of abc_company.com would flag fraudulent email from abc-company.com. LRegister all company domains that are slightly different than the actual company domain. LVerify changes in vendor payment location by adding additional two-factor authentication, such as having a secondary sign-off by company personnel. LConfirm requests for transfers of funds. When using phone verification as part of two-factor authentication, use previously known numbers, not the numbers provided in the email request. LKnow the habits of your customers, including the details of, reasons behind, and amount of payments. LCarefully scrutinize all email requests for transfers of funds to determine if the requests are out of the ordinary. Q.4. What other sorts of information should financial institutions or others STOP collecting? A.4. Financial institutions collect information to identify individuals, assess credit worthiness and maintain security. This detailed collection of personal information is required by law and regulation. This personal information is required to be protected by the Gramm-Leach-Bliley Act of 1999 (GLBA) and the regulations issued by numerous financial regulatory agencies. Financial institutions are examined by bank regulators to determine if the information collected is adequate and appropriate. Regulatory examiners also review the security of this personal information in compliance with GLBA. Bank regulators may be more knowledgeable in answering the question, what information should banks stop collecting?'' Q.5. What are the pros and cons of a Federal data breach law? A.5. I fully support handling data breaches in a manner that safeguards customer data, addresses breaches expeditiously, and properly involves law enforcement so as to bring bad actors to justice. One means of achieving this would be to create a Federal data breach law that would eliminate the possibility of a plethora of regulatory and/or State laws on the subject, some of which would prove inconsistent and contradictory in part. The current development of cybersecurity law is hindered by such problems, leading the financial sector to pursue efforts to harmonize such Federal and State laws. One concern with a Federal approach is its possible effect on smaller organizations, such as community banks and credit unions. A Federal law should not be tailored to the largest, global institutions, but should be flexible enough to apply to smaller entities without burdening them. Q.6. How should Federal data breach laws coexist with other international laws? A.6. Whether regulatory, State, Federal, or foreign, cybersecurity rules generally, and data breach laws specifically, should be reasonable, consistent, and harmonized. Firms will increasingly be subjected to the laws of many nations in the growing global economy. We must do our best in this environment to facilitate the flow of commerce, while also protecting consumer data and responding appropriately and effectively to any breach of that data. In this situation, NIST may be able to play an important role. Q.7. Firms that fail to secure their data pay substantial penalties. Hundreds of hackers go to prison. The woman [Paytsar Bkhchadzhyan] who hacked into Paris Hilton's accounts and stole her credit card information received a 5-year prison term. Taylor Huddleston (26) of Arkansas was sentenced to serve nearly 3 years for building and selling a remote access Trojan (NanoCore) to hackers. Can you give me some examples of fines, penalties and sentences for firms and individuals that engaged in cyber theft? Are these costs an appropriate deterrent? A.7. Aleksandr Andreevich Panin and Hamza Bendelladj were sentenced to a combined 24 years and 6 months in prison for their roles in developing and distributing the SpyEye banking trojan, a powerful botnet similar to the ZeuS malware. Both hackers were charged with stealing hundreds of millions of dollars from banking institutions worldwide. The Department of Justice characterized SpyEye as a ``preeminent malware banking Trojan,'' which was used to infect over 50 million computers worldwide from 2010 to 2012, causing nearly $1 billion in financial losses to individuals and financial institutions globally. I support the sentences handed down in this case, which were justified and tailored to deter other hackers. However, the allure of stealing hundreds of millions of dollars while ensconced in safe havens from which arrest and conviction are unlikely render lengthy sentences, as well as fines, insufficient deterrents. The relative ease and low cost of cyber crime is unlikely to abate without greater cooperation among international law enforcement agencies. Moreover, where nation states are involved, the Federal Government should play a greater role in deterrence and enforcement. Q.8.-Q.10. Seventy-seven percent of cyber attacks come from the outside. Yet sometimes, figuring out who the hackers were is hard to figure out. Hackers can spoof evidence. They can embed other hackers' tools. How big of a problem is figuring out attribution for hacks? Are there ways we can enhance information sharing between industry and the Federal Government to enable more rapid detection and response to cyber attacks? What tools or resources would make it easier for financial institutions to correctly attribute cyber-attacks? A.8.-A.10. Obfuscation techniques adopted by threat actors can inhibit timely and accurate attribution. Many cyber defenders can be more interested in learning threat actor tactics, techniques, and procedures which will help to detect anomalous activity than the threat actor origin. Attribution for the private sector can be most helpful, however, in identifying adversary intent. Armed with knowledge of intent, the financial sector can put additional monitors on systems. Furthermore, while the private sector is reliant on many sources of information, Government is uniquely situated to assess intent with the greatest credibility based on its intelligence sources and methods. Perhaps the most valuable way to alert the private sector about threat actor attribution and intent is through timely declassification of intelligence, or to provide requisite clearances and classified exchanges for industry professionals who can make security decisions within their organizations. Likewise, timely information on changes in known adversary methods and tools is also helpful in correctly attributing activity. Many financial institutions do not have the resources to independently attribute cyber activity and are reliant on timely Government releases or attribution provided by vendors. Q.11. In 2015, French-language TV station, TV5Monde was subjected to a significant cyber-attack which disrupted its broadcast for several hours by Fancy Bear. These are the same Russian government and military hackers that hacked the Democratic National Committee. Multiple television channels went dark. Social media channels run by the broadcasters began to spew ISIS propaganda. The attack was the work of Russian hackers which pretended to be ISIS. Russian government hackers also attacked the World Anti-Doping Agency, the power grid in Ukraine and the French electorate with another document dump. How significant is the threat to private businesses--from hostile foreign governments or terrorist organizations? A.11. Nation-state-sponsored activity is a top concern of financial firms. While the majority of the financial sector most commonly sees criminal activity, the risk of impact posed by nation-state actors is much greater. Furthermore, cyber criminals typically seek to steal funds, but have a vested interest in keeping the financial infrastructure intact. Nation states could have more nefarious intentions to disrupt the functions of the financial system in an effort to impact the U.S. economy. Businesses are reliant on the integrity of third parties and other critical infrastructure dependencies_such as electricity, communications, water, etc._in order to keep their businesses running. Nation-states have seemingly been the most interested threat actors in disrupting or destroying these functions, evidenced in part by NotPetya, WannaCry, and Shamoon attacks. Q.12. Some of the lessons from that attack was documenting IT processes, restricting access to IT processes, and keeping communications separate from incident responses. What should businesses do now to prepare for a possible attack in the future? A.12. Thoughtful and exercised incident response plans are encouraged for all financial institutions. The plans should involve multiple offices within the organization including security, legal, communications, business resilience and executive leadership. Incident response plans can aid in more accurate and prompt information sharing, as well. Businesses should also focus on the security of their third-party suppliers and remain in an active dialogue about their security practices. The prevalence of third-party risks, such as digital supply chain attacks, has increased as attack surface expands through use of the cloud and online services. Such attacks can affect institutions of all kinds, even those with robust cybersecurity measures in place. As evidence, NotPetya was initially distributed via a compromised accounting software update from the provider's server and, separately, malicious actors leveraged compromised credentials and malware to corrupt another software provider's updates to distribute malicious data-stealing code. Further, a USG Technical Alert released this year shed light on ongoing campaigns affecting critical infrastructure sectors which compromised staging targets, such as third-party suppliers, with less secure networks to reach intended victims. ------ RESPONSE TO WRITTEN QUESTION OF SENATOR JACK REED FROM MICHAEL DANIEL Q.1. In your written testimony, you stated that: the Government can facilitate disclosure of information that can help customers, clients, shareholders, and other relevant parties take appropriate defensive actions, better assess risk, and advocate for improved security. Examples of such requirements could include data breach reporting, information about material cybersecurity risks on financial statements, and public acknowledgements about how a publicly traded company is assessing and managing its cyber risk, particularly at the board of director's level. Such disclosures do not assist criminals or other bad actors--they already know where the weaknesses are; instead these requirements allow market forces to operate more efficiently. Could you please go into greater detail about how cybersecurity disclosure would allow market forces to operate more efficiently? A.1. Right now, consumers often lack information about a product or service's cybersecurity. As a result, they cannot factor that information into a purchasing decision. Just as with disclosing calorie counts in food products, if consumers had more access to information they could use that information to make better choices. And if some consumers began to discriminate among products or services based in part on their cybersecurity, then producers and suppliers would have an incentive to create more secure outputs. ------ RESPONSE TO WRITTEN QUESTION OF SENATOR MARK WARNER FROM MICHAEL DANIEL Q.1. Is verifying that financial institutions have an internal cybersecurity audit function or an independent third-party assessment sufficient, or should financial regulators develop their own view of the cybersecurity posture of supervised entities in addition to requiring independent third-party assessment? Are you and others in the industry seeing an uptick in interest from regulators in cyber risk? What issues do regulators focus on in their examinations? What do you believe is the appropriate role of the financial regulators in assessing the cybersecurity of institutions they regulate? A.1. I believe that regulators should largely rely on third- party assessments, rather than trying to develop the capability in-house to conduct reviews at the scale required for our financial sector. That said, financial regulators should have staff capable of interpreting those assessments and determining whether the assessment demonstrates that the institution is meeting its requirements. I cannot speak to what financial regulators focus on in their examinations but I can suggest the Committee explore the oversight and examination material of the financial regulatory agencies and bodies such as the Federal Financial Institutions Examination Council. The key issue is whether the institution is appropriately considering systemic risk as well as the immediate risk to the company in managing its cybersecurity. Institutions have an incentive to ensure that they can conduct business, maintain customers, and preserve their reputation. However, the incentives are not strong enough on their own for the institution to invest in cybersecurity that in turn helps drive down risk across the sector (and therefore to the broader economy) as a whole. That's where--systemic risk to the broader sector and economy--the Government regulators should focus. ------ RESPONSES TO WRITTEN QUESTIONS OF SENATOR CORTEZ MASTO FROM MICHAEL DANIEL A year and a half ago, William and Margaret Frederick sold their home in Ohio so they could buy a home in Las Vegas, Nevada. The couple expected to make a $216,000 profit on the sale. But, their real estate agent read a hacked email supposedly from William--the fake email had three L's in Bill instead of two--and sent the profit to the hacker. William was 83 and Margaret 77. Someone stole the money they intended to live on in retirement. Real estate transaction fraud is a problem in Nevada and nationwide. Thieves wait for the right time to impersonate a bank or realtor and send you different wire transaction instructions. Estimates are as much as $400 million a year in losses. Q.1. What more can financial institutions do to prevent thieves from stealing people's down payments, earnest money and even the entire home payment if someone is buying a home for cash? Please identify the best practices for realtors, title agents and mortgage brokers? A.1. Although the Internet often makes fraud easier to perpetrate, the best practices to combat cyber-enabled fraud are often the same in other domains. I would point to references like the Federal Trade Commission, the Financial Crimes Enforcement Network, the Federal Bureau of Investigation_Financial Institution Fraud division, the Financial Services Information Sharing and Analysis Center, and similar organizations that lay out best practices to combat fraud. One way to protect consumer's information is to not collect it. For example, why should merchants of any sort, including doctors, insurance companies and utilities, require social security numbers as part of their information or data-set on their customers? Should we limit Social Security numbers provided to merchants? LWhat other sorts of information should financial institutions or others STOP collecting? LState and International Laws Relating to Cybersecurity LWhat are the pros and cons of a Federal data breach law? LHow should Federal data breach laws coexist with other international laws? A.2. The first step in managing cyber risk more effectively is understanding your information environment: what information does your organization hold and why is it holding it? An organization should only hold and manage information for which there is a legitimate business purpose, and it should only hold that information for as long as needed for the business purpose (or according to law, if the organization has legal obligations for data retention). Thinking through these questions will enable an organization to determine what information it really needs to collect and store, and then how long it needs to retain that information. In terms of digital identity and how best to conduct identity proofing without relying on social security numbers, I would recommend that the Committee look at research being done related to digital verification processes in cyberspace. Some examples of this work and related suggestions can be found at the National Strategy for Trusted Identities in Cyberspace (NSTIC) and the Better Identity Center here in Washington, DC. Q.3. Firms that fail to secure their data pay substantial penalties. Hundreds of hackers go to prison. The woman [Paytsar Bkhchadzhyan] who hacked into Paris Hilton's accounts and stole her credit card information received a 5-year prison term. Taylor Huddleston (26) of Arkansas was sentenced to serve nearly 3 years for building and selling a remote access Trojan (NanoCore) to hackers. Can you give me some examples of fines, penalties and sentences for firms and individuals that engaged in cyber theft? Are these costs an appropriate deterrent? A.3. This specific question falls outside my area of expertise. However, measuring deterrence is always challenging, whether in the physical world or in cyberspace. Q.4.a. Seventy-seven percent of cyber attacks come from the outside. Yet sometimes, figuring out who the hackers were is hard to figure out. Hackers can spoof evidence. They can embed other hackers' tools. How big of a problem is figuring out attribution for hacks? Are there ways we can enhance information sharing between industry and the Federal Government to enable more rapid detection and response to cyber attacks? A.4.a. Attribution remains a challenging endeavor for multiple reasons. First, attribution involves combining technical capabilities, data from a number of victims, and considerable time. While the U.S. Government and cybersecurity companies have improved their attribution capabilities significantly, even these organizations have to invest considerable resources into this work. Second, even if cybersecurity companies can attribute malicious activity to a particular group or adversary, taking the next step of tying that attribution to an individual in the real world is even harder. Q.4.b. What tools or resources would make it easier for financial institutions to correctly attribute cyber-attacks? A.4.b. We can definitely improve information sharing between the Federal Government and the private sector. In particular, we need to build the technical mechanisms, the business processes, and the legal understandings to enable this exchange to occur at both machine speed and at human speed. Financial institutions may not be able to attribute most malicious activity on their own and it may not be in their best interest to do so. However, they can provide forensic and other data that can help organizations, such as threat researchers and Government agencies that can make the attribution. Q.5. In 2015, French-language TV station, TV5Monde was subjected to a significant cyber-attack which disrupted its broadcast for several hours by Fancy Bear. These are the same Russian government and military hackers that hacked the Democratic National Committee. Multiple television channels went dark. Social media channels run by the broadcasters began to spew ISIS propaganda. The attack was the work of Russian hackers which pretended to be ISIS. Russian government hackers also attacked the World Anti-Doping Agency, the power grid in Ukraine and the French electorate with another document dump. How significant is the threat to private businesses--from hostile foreign governments or terrorist organizations? A.5. Criminal actors conduct the overwhelming majority of malicious activity online and, as a result, are the primary cybersecurity threat to most businesses. However, the threat from nation-state actors is very real and organizations should take it seriously. Fortunately, the best practices that work against criminal organizations can also impede nation-state actors. Therefore, companies should focus on implementing cybersecurity best practices, regardless of the adversaries they face. The threat from most terrorist organizations remains fairly nascent. Terrorist groups are effective at using the Internet as a recruiting platform, but their ability to use it to carry out operations remains limited. Some groups attempt to hack into companies to expose private information, but few have the capability to do more than that right now. However, given terrorists' high motivation to cause damage, if a nation-state decided to supply a terrorist organization with malware or other tools, that group's capability to cause harm could grow rapidly. Q.6. Some of the lessons from that attack was documenting IT processes, restricting access to IT processes, and keeping communications separate from incident responses. What should businesses do now to prepare for a possible attack in the future? A.6. All organizations should adopt a holistic risk management approach and that should include managing their cyber risk. Best practices for managing cyber risk have been promulgated in the Cybersecurity Framework published by the National Institute of Standards and Technology and in collaboration with the private sector and other Government agencies. Such an approach can guide an organization to understand its information assets and business processes; invest in more effective protections; have a capability to detect when malicious activity is occurring; develop an incident response plan for when bad events occur; and create a plan for restoring business operations as soon as possible. Adopting a holistic approach is the most effective way a company can prepare for malicious cyber activity. ------ RESPONSES TO WRITTEN QUESTIONS OF SENATOR WARNER FROM PHIL VENABLES Q.1. How do banks--much less regulators--evaluate and manage risk of IT environments that combine not only third-party software and products, but also decades-old legacy IT? A.1. Third-party software and hardware risk is an ongoing challenge requiring institutions to have clear policies and practices to manage the risk of third-party products in the environment. In more sophisticated organizations a risk assessment, code analysis and operational penetration testing may be conducted to ensure any critical and externally facing applications and platforms are appropriately hardened. Legacy IT infrastructure risk is a challenge facing many medium-to-large organizations. Most financial institutions have been required by Federal regulators to conduct an appropriate risk analysis of their IT environment to identify that infrastructure which is not able to have software patches applied to address current vulnerabilities and threats. Sophisticated organizations prioritize protection and remediation of these legacy environments based on relative risk of the platforms and technology. Externally facing systems are generally the priority for remediation and Federal regulators will generally require evidence of an appropriate ongoing vulnerability management and vulnerability scanning program to ensure that high-risk vulnerabilities are adequately being managed. Effectively managing third-party and legacy infrastructure risk is predicated on the organization having up-to-date inventories of hardware and software and understanding the associated risks. This can be challenging in large, global organizations and requires significant and ongoing discipline with appropriate policies and practices to ensure consistency. Q.2. Could the kind of meltdown we're seeing in the United Kingdom with TSB Bank happen in the United States as a result of an IT migration? A.2. Public reporting on the TSB Bank incident indicates the issue was caused by a variety of failures in the organization's testing, change management, migration, communications and regulatory engagement processes. The migration of such a large volume of customers (5.2 million) in one activity is a significant risk. There is no public information available as to what testing took place behind the scenes prior to the upgrade and what processes failed in the transition so our ability to assess what went wrong in the migration is extremely limited. Media reporting also indicates TSB, and parent company Banco Sabadell, declined assistance from Lloyd's early in the migration crisis. Sound change management policies and practices, exercised and comprehensively tested using a phased migration approach are clear recommendations for any complex or significant migration or upgrade. For significant changes and migrations it is recommended to have a prepositioned communications plan supporting clear and transparent customer and regulatory notification should issues be encountered. ------ RESPONSES TO WRITTEN QUESTIONS OF SENATOR CORTEZ MASTO FROM PHIL VENABLES Q.1. What more can financial institutions do to prevent thieves from stealing people's down payments, earnest money and even the entire home payment if someone is buying a home for cash? Please identify the best practices for realtors, title agents and mortgage brokers? A.1. Fannie Mae and Freddie Mac provide comprehensive resources including fraud mitigation best practices to provide guidance for all entities in the mortgage transaction flow. https://www.fanniemae.com/singlefamily/mortgage-fraud- prevention http://www.freddiemac.com/singlefamily/fraud.html http://www.freddiemac.com/singlefamily/pdf/fraudprevention _practices.pdf Small- to medium-sized organizations supporting mortgage services should review and follow cybersecurity best practices, such as those offered by the ``Staysafeonline'' website maintained by the National Cybersecurity Alliance, in order to provide appropriate protection for the personal identifying and bank account information they collect. Public reporting indicates some mortgage brokers and smaller organizations may be utilizing public email services for transacting business that if compromised could allow identity theft and fraud. Businesses should conduct a security review of their email accounts based on the provider's recommendations and implement the appropriate enhanced security offerings for these email services. https://staysafeonline.org/cybersecure-business/ https://landing.google.com/advancedprotection/ https://help.yahoo.com/kb/SLN5013.html Fannie Mae and Freddie Mac further offer recommendations for consumers around red flags that may be indicative of fraud during mortgage transactions. One significant indicator of attempted wire transfer fraud may be an unexpected email indicating a late change to the payee/beneficiary account information prior to an upcoming funds transfer. The safest course for consumers is to not trust any wire transfer instructions received via email and to validate all financial details via phone call to a confirmed number that was not provided in any email communications. https://www.fanniemae.com/content/news/mortgage-fraud-news- 0116.pdf https://www.fanniemae.com/content/tool/mortgage-fraud- prevention-consumers.pdf http://www.freddiemac.com/singlefamily/fraud.html http://www.freddiemac.com/perspectives/robb_hagberg/2017 0612_combating_mortgage_fraud.html Q.2. What other sorts of information should financial institutions or others STOP collecting? A.2. We support the adoption of the principle of ``data minimization'' under which a business should collect and process only such personal information as is necessary for it to achieve the task at hand, whether that be servicing the customer, complying with its own legal or regulatory obligations, or pursuing some other legitimate purpose. Q.3. State and International Laws Relating to Cybersecurity A.3. To date, most States have avoided the imposition of detailed, prescriptive requirements as to the safeguarding of personal and business related information opting instead for a high level, and more flexible, approach of requiring businesses to implement and maintain ``reasonable security procedures and practices'' appropriate to the nature of the information processed, the type of activities conducted, the size and complexity of the organization, etc. Notable exceptions to this general rule are Massachusetts, Nevada and, more recently and only as to organizations s under its supervision, New York State's Department of Financial Services. In general, the ``data protection'' laws outside of the United States are principles based, particularly as it relates to security controls. Although an obligation to maintain the security of personal data is one of these principles, most countries have, like the majority of our states. These laws generally do not impose prescriptive safeguarding obligations and instead taken the approach of imposing an obligation to implement ``appropriate technical and organizational measures'' to protect personal data. This approach is reflected in the E.U. General Data Protection Regulation which took effect late last month. Laws focusing on the protection of information other than personal data or on cybersecurity measures more generally have been less common. That trend changed, as to Europe at least, in 2016 with the adoption of the Network and Information Security Directive which was required to be implemented by E.U. Member States on or before May 9, 2018. The Directive is the first EU-wide piece of legislation concerning cybersecurity. Q.4. What are the pros and cons of a Federal data breach law? A.4. The main and very significant benefits of a Federal data breach notification law are consistency and efficiency. Although the State laws on this point share many similarities, there is enough divergence in the underlying requirements to make responding to an incident having a multi-State impact very challenging. Analysis of these differences across State laws and their application to the specific facts of each incident is time consuming and can result in unnecessary delay in notifying impacted individuals. A single requirement at the Federal level would promote consistency. Assuming a breach notification regime is to be required, there is very little downside in having this imposed at the Federal, rather than at the State, level. Q.5. How should Federal data breach laws coexist with other international laws? A.5. Individuals, regardless of where they are located, who are exposed to a significant risk of harm when their personal information is compromised due to a cybersecurity breach, should be apprised of that breach and given sufficient information to take the measures necessary to protect themselves. State breach notification laws have led the way in this regard and, with the inclusion of a breach notification requirement in the new General Data Protection Regulation, the European Union has now formally acknowledged the value of this principle. In light of this new E.U. requirement, it is more important than ever that the United States adopt a single breach notification regime nationwide in order to ensure that incidents having international impact are responded to promptly, consistently and efficiently. Q.6. Can you give me some examples of fines, penalties and sentences for firms and individuals that engaged in cyber theft? Are these costs an appropriate deterrent? A.6. Recent examples of sentencing and penalties for criminal groups and individuals are as follows: LOn April 18 2018, Dwayne C. Hans of New York was sentenced to 36 months in prison for attempting to steal more than $3 million from the Pension Benefit Guaranty Corporation, Defense Logistics Agency and General Services Administration. He was ordered to pay restitution of $134,000.00 for activities conducted between July 2015 and October 2016, when he committed fraud by impersonating an authorized representative of a U.S. financial institution and a defense contractor. Hans had previously pleaded guilty to one count of wire fraud and one count of computer intrusion. https:// www.justice.gov/usao-edny/pr/cyber-criminal-sentenced- 36-months-prison-attempting-steal-more-3-million- financial. LOn November 30, 2017, Russian cyber-criminal Roman Valeryevich Seleznev aka Track2, Bulba and Ncux, was sentenced to serve 168 months in prison for one count of participation in a racketeering enterprise and 168 months in prison for one count of conspiracy to commit bank fraud with the sentences to run concurrent to one another. In both cases, Seleznev was ordered to serve 3 years of supervised release to run concurrently and ordered to pay restitution in the amount of $50,893,166.35 in Nevada and $2,178,349 in Georgia. Seleznev pleaded guilty to the charges and admitted affiliation with the Carder.su organization, an Internet-based, international criminal enterprise whose members trafficked in compromised credit card account data and counterfeit identifications and committed identity theft, bank fraud, and computer crimes. https://www.justice.gov/opa/pr/russian-cyber-criminal- sentenced-14-years-prison-role-organized-cybercrime- ring-responsible. LOn May 25, 2017, three Nigerian cyber actors were sentenced for Federal offenses including mail fraud, wire fraud, identity theft, credit card fraud, theft of Government property, and conspiracies to commit bank fraud and money laundering. The maximum penalty imposed on a defendant was 115 years in prison and the minimum sentence handed down was 25 years. Overall 21 defendants had been charged in the case which was led by Homeland Security Investigations. The stronger penalties were imposed due to the bank fraud and money laundering elements of their activities. https:// www.justice.gov/opa/pr/three-nigerians-sentenced- international-cyber-financial-fraud-scheme. Federal Judges may face difficulty in determining sentencing in cyber crime cases due to the broad types and scope of impact, including where there may be difficulty in articulating a direct financial loss. Based on sentencing guidelines from the Department of Justice, fraud cases where there is direct loss to specific victims are generally easier to determine than matters where there is no direct loss, such as theft of information. Further, in general charges asserted in most cyber crime cases are generally a subset of a broader array of activity by the perpetrator, and for some alleged crimes there may be only limited evidence for some crimes. Consequently, many cyber criminals may only ever be charged and sentenced based on a small subset of their overall criminal behavior, which in many cases stretches back over many years. Many overseas higher order cyber-criminal actors are unlikely to ever face prosecution and sentencing due to their location in countries that will not extradite or work with U.S. law enforcement. Further in some countries, advanced cyber criminals may present a potential asset to Government military and intelligence capabilities so there is even less incentive to proceed with prosecution. The use of cyber criminals to support state-sponsored cyber operations was publicly confirmed with the release of the indictment in the Yahoo email compromise incident. https://www.justice.gov/opa/pr/us-charges- russian-fsb-officers-and-their-criminal-conspirators-hacking- yahoo-and-millions. There is likely some deterrent value in stiff sentencing for cases, but the broad nature of offenses and diversity of sentencing is likely to present little deterrent to those adversaries located overseas, particularly if they have relationships supporting intelligence and military operations. Q.7. How big of a problem is figuring out attribution for hacks? Are there ways we can enhance information sharing between industry and the Federal Government to enable more rapid detection and response to cyber-attacks? A.7. The ability to potentially attribute cyber threat activities to a specific actor or series of actors varies greatly based on the type and impact of the incident. Attribution is generally a complex problem and an investigative challenge based on the availability of a set of technical fragments of evidence, which are aggregated, analyzed and compared against other cyber activities where the perpetrators have been identified with some degree of confidence. At the strategic level, where nation states are the primary threat actors, geopolitical context may suggest from an intelligence perspective that an adversary is responsible for a set of cyber threat activity that was triggered in response to specific event(s). Ability to attribute consequently varies between national security and purely criminal threats, with national security threat actors much more likely to be proactively monitored by the Intelligence Community. In criminal cases there is generally a requirement for significant forensic reconstruction of events to be able to coherently trace and attribute malicious activity. Further in the majority of cyber-criminal cases involving fraud and theft, following the network and financial transaction trails will generally lead overseas as criminals know that cross international jurisdictions substantially increases the complexity of investigation for U.S. agencies, particularly if some of the traffic is routed through countries which have tense or poor relations with the United States. Nation state military and intelligence services may also attempt to actively obfuscate and potentially misattribute activity. The financial sector has a variety of robust information sharing arrangements with U.S. Government agencies through sector associations including the Financial Services Information Sharing and Analysis Center (FS-ISAC) and Financial Systemic Analysis and Resilience Center (FSARC), and at the individual financial institution level. During the 2011-2014 Distributed Denial of Service (DDoS) attacks the FS-ISAC and individual member institutions worked collaboratively and individually with the Government agencies to identify, attribute and mitigate cyber threat activities. That collaboration has continued through the current time. Q.8. What tools or resources would make it easier for financial institutions to correctly attribute cyber-attacks? A.8. To further clarify, the term cyber-attack is, at times, misused in the media which unfortunately confuses the issue of determining the actual objective of an adversary, which may be surveillance, theft, disclosure, manipulation/alteration or disruption/destruction, and much of which has distinctly different impacts to a victim organization. Attribution is generally a confidence weighted activity and the ability of a private institution, or group of institutions, to successfully attribute cyber activity varies greatly on the type of activity and the type of adversary. In nation-state cases, there may be geopolitical indicators which provide a level of inference lacking in other types of cyber activity. Publicly attributing cyber activity may present risk to any institution making the statements as an adversary may become particularly focused on that institution in response. This was seen during the 2012 DDoS attacks where an institution that publicly attributed the attacks in media to Iran was subjected to ongoing focus as a result. Q.9. How significant is the threat to private businesses--from hostile foreign governments or terrorist organizations? A.9. Nation states have conducted cyber-criminal, cyber espionage and cyber-attack actions against private sector firms globally. Q.10. What should businesses do now to prepare for a possible attack in the future? A.10. Businesses should understand the domestic and global operational risk environment in which they operate and have a clear view of which assets are at most cyber risk. They must adopt a defense-in-depth approach to cybersecurity that emphasizes a ``default deny'' approach and assesses organizational controls against most like adversary capabilities. Determining the identity, capabilities and likelihood of the most significant cyber adversaries an organization faces is an ongoing activity that can then be used to assess the adequacy of the controls against the threat's technical capabilities. This ability to conduct this risk analysis is predicated on the following organizational capabilities: LIdentifying targeted campaigns against the organization from broader activity targeting the industry and Internet as a whole LAnalyzing and attributing the campaigns that have been previously observed and are currently being observed LAscertaining the adversary's objectives in the campaigns LUtilizing observations and threat intelligence to develop a model of adversaries technical capabilities and then prioritizing them based on the highest technical capabilities LModeling adversaries' capabilities against the organization's control capabilities should result in a residual risk assessment of the organization's abilities to defend against their prioritized adversary capabilities and highlight control gaps or deficiencies that need enhancement. More broadly this type of analysis should be conducted on an ongoing basis against the broader cyber threat environment to ensure the organization always understands its ability to mitigate current and developing cyber threats. ------ RESPONSES TO WRITTEN QUESTIONS OF SENATOR WARNER FROM BOB SYDOW Q.1. Do regulators, who have the ability to supervise the banks and their relationships, but not the third-party vendors themselves, have sufficient authority to monitor these risks appropriately? A.1. Regulators have been addressing the topic of third-party risk and the vendors across a number of dimensions, including but not limited to: LIssuing guidance and requirements for outsourcing risk and third-party risk management LSetting expectations that regulated firms have effective programs over their third parties to confirm that they are fulfilling the firms' contractual, compliance, consumer protection, legal and obligations LExamination of how firms manage third parties-- especially critical vendors--within the context of how they assess and manage risks across various domains (e.g., cyber, critical business processes, Recovery and Resolution Planning). For example, the Office of the Comptroller of the Currency (OCC) has issued the following guidance for managing third- party risk: When circumstances warrant, the OCC may use its authority to examine the functions or operations performed by a third party on the bank's behalf. Such examinations may evaluate safety and soundness risks, the financial and operational viability of the third party to fulfill its contractual obligations, compliance with applicable laws and regulations, including consumer protection, fair lending, BSA/AML and OFAC laws, and whether the third party engages in unfair or deceptive acts or practices in violation of Federal or applicable State law. The OCC will pursue appropriate corrective measures, including enforcement actions, to address violations of law and regulations or unsafe or unsound banking practices by the bank or its third party. The OCC has the authority to assess a bank a special examination or investigation fee when the OCC examines or investigates the activities of a third party for the bank. (OCC Bulletin 2013-29.) Another example is: Guidance for Managing Third-Party Risk,'' FIL-44-2008, published by the Federal Deposit Insurance Corporation. It states in part: ``Review of third-party relationships contributes to the FDIC's overall evaluation of management and its ability to effectively control risk. Additionally, the use of third parties could have a significant effect on other key aspects of performance, such as earnings, asset quality, liquidity, rate sensitivity, and the institution's ability to comply with laws and regulations. Findings resulting from the review of an institution's third-party relationships will be addressed as needed in the Report of Examination. Appropriate corrective actions, including enforcement actions, may be pursued for deficiencies related to a third-party relationship that pose a safety and soundness or compliance management concern or result in violations of applicable Federal or State laws or regulations. Financial institutions are reminded that indemnity or other contractual provisions with third parties cannot insulate the financial institution from such corrective actions. Q.2. Are regulators focusing on third-party vendor management in their examinations? Are you seeing increased enforcement or other critical action from regulators against banks due to insufficient compliance programs for third-party vendor management? A.2. EY sees banking regulators conducting exams that include a specific focus on third-party vendor management. The focus of these exams is across topics ranging from governance, due diligence, risk assessment, ongoing monitoring, cyber, resiliency, contracting and the cataloging and inventory of third-party vendors. Q.3. In its semiannual report in 2017, the Office of the Comptroller of the Currency noted that concentration in third- party service providers, such as providers of enterprise software or security products and services, has increased cybersecurity supply chain risk. Do you agree with this assessment? Do you believe that there is a potential systemic risk issue with dependencies on key third-party vendors or the wide use of certain software? Should regulators require a software bill of materials to understand what's inside third- party IT products? A.3. A number of factors are contributing to an increase of cybersecurity supply chain risk including: emerging interconnected technologies that drive fundamental transformations and create complex third-party ecosystems; the volume, velocity and precision of attacks; and the shortage of cybersecurity resources and skilled professionals. Additionally, many entities face not only third-party risk, but may also need to consider fourth and fifth parties in their evaluation of risk. While vendors can help provide solutions to address some of the resource constraints, third parties inherently create additional risk. Any single entity can be a potential threat entry point, which may cause a ripple effect across the enterprise or industry. Heightened regulatory and market focus have increased pressure on financial institutions to account for how third-party suppliers and vendors use and protect their data and manage sustainable operations, especially for critical services. Additionally, many financial services companies work with Fin Tech and RegTech companies or are looking for efficiency and innovation through use of the cloud. These also put further focus on third-party vendor cybersecurity risks. The private sector is also focused on components of the supply chain that could create systemic risk and is working with the regulatory community to identify, evaluate, plan and exercise cyber response plans. This includes but is not limited to the power and utilities sector, payment processors, servicers, financial market utilities and infrastructure providers. Continued collaboration and focus on these efforts will be critical for preparedness. Leading practices for companies to enhance their cyber capabilities, including consideration for third parties, include: LIdentify their most important assets consisting of critical business processes, systems, infrastructure, data and dependent third parties that are most critical to the financial institutions, including their role in the broader financial services ecosystem. LProtect their high-value assets and underlying system architecture for enhanced security. LDetect threats and vulnerabilities to proactively identify threats with better threat intelligence, detection and management capabilities. LRespond to cyber incidents to rapidly contain the damage, and mobilize the diverse resources needed to minimize impact--including direct costs and business disruption, as well as reputation and brand damage. LRecover from cyber disruptions to resume normal business operations as quickly as possible. Q.4. Is verifying that financial institutions have an internal cybersecurity audit function or an independent third-party assessment sufficient, or should financial regulators develop their own view of the cybersecurity posture of supervised entities in addition to requiring independent third-party assessment? A.4. Traditionally, the main role of internal audit, which is often referred to as the third line of defense in the three lines of defense (3LoD)\1\ risk management model described below, has been to provide an independent and objective assessment of the firm's processes across the first and second lines of defense, with the focus on operational effectiveness and efficiency as part of the firm's overall risk governance approach. As qualified technical resources are limited, internal audit groups often turn to co-sourcing arrangements with a qualified third party to augment their teams to provide technical resources to assess risk and execute audit programs to validate controls over applications and technology infrastructure, cyber risk governance and risk managements, conduct independent penetration testing and vulnerability assessments, etc. --------------------------------------------------------------------------- \1\ This Includes excerpts from EY's Cyber risk management across the lines of defense, EYGM Limited, April 2017. --------------------------------------------------------------------------- In cases where a firm has taken the appropriate actions so that qualified technical resources are available to support their internal audit team, the need for an independent third- party assessment and/or independent regulatory review would not appear to be necessary. Conversely, in cases where a firm does not have sufficiently qualified technical resources inhouse and has elected not to utilize the services of a qualified third party, some form of annual--independent assessment may be necessary. Q.5. Are you and others in the industry seeing an uptick in interest from regulators in cyber risk? What issues do regulators focus on in their examinations? A.5. In light of the heightened threat presented by cyber risks, regulators globally have stepped up their focus on cybersecurity. Each regulator reviews cybersecurity in its own way, and takes into consideration its own view of the cyber risks in the industry and specific institutions, when conducting its reviews. Across the course of their ongoing supervisory reviews, supervisors increasingly assess a bank's ability to manage cyber risk across the 3LoD. The first line operates the business, owns the risk and designs and implements operations. The second line defines policy statements and the risk management framework, provides a credible challenge to the first line and is responsible for evaluating risk exposure for executive management and the board to consider when establishing a risk appetite. The third line of defense, which is also commonly referred to as ``internal audit,'' is responsible for the independent evaluation of the first and second lines. EY has found that establishing a 3LoD approach to cyber risks is not a trivial task for an organization, but it is becoming essential in the cyber world we have entered. Financial services firms are still grappling with how to best implement the model across their businesses for existing nonfinancial risks. Adding cyber risk management as well as strong board oversight during the implementation of the 3LoD model poses an even greater challenge for organizations. First line of defense A strong first line of cybersecurity defense requires a significant effort. Whether in the retail bank, investment bank, corporate bank, private bank or any other area, business heads will have to perform a thorough examination to determine whether the business is doing enough to manage cyber risk. Information security groups can no longer apply one-size-fits- all solutions to the entire enterprise. Instead, each line of business must carefully define the cyber risks and exposures it faces. Cyber risks need be woven into the fabric of the first line's risk and control self-assessment and into fraud, crisis management, and resiliency processes. The lines of business will need to actively monitor existing and future exposures, vulnerabilities, threats and risks associated with their activities. In addition to leveraging technologies, businesses need to determine the impact that cyber risk will have on its clients, operational processes and strategies. These new responsibilities require significant investment in people and tools, including upgraded monitoring and analytic capabilities to provide improved assessments of current levels of cyber risk. Second line of defense The independent second-line cyber risk management function manages the enterprise cyber risk appetite and risk management framework within the context of the overall enterprise risk strategy. This group challenges the first line's application of the board-approved cyber framework and appetite. Second-line risk management plays a critical role in managing cyber risks and should not be walled off as a separate risk function. As the keeper of a firm's board-approved risk tolerance, it determines how to appropriately measure cyber risks, embedding quantitative and qualitative (e.g., reputational) thresholds for cyber risks into the statement of risk tolerance for the firm. Moreover, these clearly established appetite and associated thresholds need to cascade down into the operations for each line of business. Given the relative novelty of applying the 3LoD model to cyber risk, most of the first and second lines focus appropriately on more effective management of these risks rather than the narrower issue of compliance. However, with an increasing volume of regulatory guidance and mandatory requirements stemming from industry, professional and regulatory standards, cyber will increasingly constitute a material compliance risk. Accordingly, supervisors should assess whether financial institutions integrate cyber risk compliance into second-line risk management. Third line of defense Traditionally, the main role of the third line of defense has been to provide an independent and objective assessment of the firm's process across the first and second lines of defense, with the focus on operational effectiveness and efficiency as part of the firm's overall risk governance approach. Regulators are now focusing on how effective and independent a firm's internal audit team is when it comes to reviewing the firm's approach to cybersecurity. For example, banking regulations focused on cybersecurity often include references to the importance of an ``annual independent assessment,'' such as those included in Federal Financial Institutions Examination Council (FFIEC) and NIST requirements and guidelines. As a foundation, EY recommends that the internal audit team include within its overall audit plan an evaluation of the design and operating effectiveness of cyber risk management across the first and second lines of defense. Traditionally, industry standards, such as the NIST's Cybersecurity Framework guidelines have been used as the benchmark for evaluating a firm's effectiveness. Going forward, internal audit teams at financial institutions may need to create their own framework or apply multiple industry frameworks. By doing so, internal auditors will maintain greater objectivity in assessing cyber risk management effectiveness, eliminating the potential blind spots that can result from using a common standard throughout all three lines of defense. Under the 3LoD model, internal auditors perform procedures such as assessments, validation of applications and technology infrastructure, evaluations of third-party risks, conduct some level of intrusive-based testing, either by themselves or using third parties, incorporate cyber into regular audits and have a responsibility to stay abreast of cyber threat intelligence. Board oversight of cyber risk management Supervisors should also assess the degree to which boards of directors provide effective challenge and oversight of the bank's cyber risk management. Boards need to understand the maturity of their organizations' approach relative to evolving industry and regulatory trends. A cyber risk maturity assessment should be broad in nature, considering people, process and technology as well as existing and planned improvement or remediation activities. The view on program maturity needs to be combined with a proper assessment of existing threats and vulnerabilities, and the evolving threat landscape. Boards should press management to quantify cyber risk as much as possible so that quantitative statements on the degree of cyber risk are incorporated into the firm's risk appetite statement. The cyber risk appetite statement should link directly to cyber and technology operational thresholds and tolerances. Boards should insist on more credible cyber risk reporting, in the context of the approved cyber risk appetite. Boards should also determine how they evaluate the quality, accuracy and timeliness of cyber metrics. Boards should challenge how they oversee cyber risk across their own governance structure. The board should revisit its strategy for keeping directors abreast of cyber threats, trends and the evolving business implications. Boards should press management to quantify cyber risk as much as possible so that quantitative statements on the degree of cyber risk are incorporated into the firm's risk appetite statement. The cyber risk appetite statement should link directly to cyber and technology operational thresholds and tolerances. Aspects of cyber risk management should be built into an ongoing training program throughout the year, with overview sessions and deep dives on the most relevant topics and issues.\2\ --------------------------------------------------------------------------- \2\ For an example of an effective cyber risk dashboard, see Appendix F of the ``Cyber-Risk Oversight: Director's Handbook Series,'' National Association of Corporate Directors, 2017. --------------------------------------------------------------------------- Ultimately, the board is accountable for requiring that management adapts quickly enough to manage this enterprise risk more effectively and efficiently, and it is charged with providing a credible challenge to management's approach. Q.6. What do you believe is the appropriate role of the financial regulators in assessing the cybersecurity of institutions they regulate? A.6. We see several regulatory roles related to cybersecurity including: LEngaging in public/private sector dialogues and efforts to support sharing intelligence and leading practices LConsidering how effectively cyber resiliency has been built into an organization's three lines of defense as referenced in my testimony LConsidering the level of board engagement in cyber risk management LAdvancing opportunities to seek sources of new talent for both public and private sector needs, as observed during my testimony Companies that exercise good faith efforts, establish cyber risk management frameworks and adopt such leading practices as outlined in the previously submitted testimony should benefit, not only within the company, but in the eyes of stakeholders, regulators and enforcement agencies, especially relative to liability and penalty measures. ------ RESPONSES TO WRITTEN QUESTIONS OF SENATOR CORTEZ MASTO FROM BOB SYDOW Q.1. A year and a half ago, William and Margaret Frederick sold their home in Ohio so they could buy a home in Las Vegas, Nevada. The couple expected to make a $216,000 profit on the sale. But, their real estate agent read a hacked email supposedly from William--the fake email had three L's in Bill instead of two--and sent the profit to the hacker. William was 83 and Margaret 77. Someone stole the money they intended to live on in retirement. Real estate transaction fraud is a problem in Nevada and nationwide. Thieves wait for the right time to impersonate a bank or realtor and send you different wire transaction instructions. Estimates are as much as $400 million a year in losses. What more can financial institutions do to prevent thieves from stealing people's down payments, earnest money and even the entire home payment if someone is buying a home for cash? Please identify the best practices for realtors, title agents and mortgage brokers? A.1. Consumer education about common financial fraud methods and how to securely communicate their sensitive data should be driven as a combined effort by the private sector and public entities to foster an ongoing culture of greater awareness. Financial institutions can work to implement two-way verification of identities on the web, mobile and other virtual spaces to gain greater confidence that they are interacting with their intended customer and for the customer to have confidence they are communicating with their intended institution. Additional monitoring controls for higher-risk consumers and transactions should be considered, but this should be balanced with the need to maintain fluidity and velocity of transactions without adding risk to the banks themselves for delays or rejected payments. Underpinning all of these controls, however, is the growing need for an improved form of digital identification for all entities, consumer and institutional, that can support enhanced authentication and be easily used and verified for online transactions. Educating individual business owners about cybersecurity and cyber posture is a topic on which the public and private sector should work together. EY recognizes the importance of better cyber hygiene throughout the ecosystem, and would encourage policymakers to consider what levers it has available to reach individual business owners. Q.2. One way to protect consumer's information is to not collect it. For example, why should merchants of any sort, including doctors, insurance companies and utilities, require Social Security Numbers as part of their information or data- set on their customers? Should we limit Social Security Numbers provided to merchants? A.2. The value of the Social Security Numbers (SSN) as a private and unique identifier must be viewed relative to the risk that currently exists based upon years of propagating this same identifier across multiple systems. In my view, continued usage of this same identifier, coupled with the aggregation of cybersecurity breaches that have gained access to this identifier, diminish its value and instead heightens the risk associated with using it. Unique identifiers must be evaluated from multiple perspectives before deciding upon their value. For example, the use and collection of an identifier that is unique to a particular industry segment may be reasonable, if its usage across various entities encourages innovation, benefits society, limits other risks or provides convenience to consumers and furthermore, if the risks associated with using the identifier do not outweigh those values or may be mitigated. It is the data that is associated with the unique identifier that creates the risk and hence there may be ways to still achieve value while minimizing risk by limiting those data elements about an individual that are associated with any identifier. In other contexts, there may be better ways than using a unique identifier to manage risk. One example is when the identifier is being used solely for the purpose of authenticating someone's identity. There are other ways to achieve this, including through encrypted identifiers and multifactor authentication. Q.3. What other sorts of information should financial institutions or others STOP collecting? A.3. Many companies across industries are required to collect SSNs to comply with legal and regulatory requirements. For example, financial institutions are required to collect and retain SSNs when customers open an account or apply for a mortgage. Health insurance companies are also mandated by Government to collect SSNs for individuals they insure. In such cases, companies cannot voluntarily choose whether or not they collect SSNs from their customers. When considering policies to change the collection and use of SSNs, it is important to understand whether the proposal would impact the use of the SSN as an identifier or authenticator. SSNs were created to be a unique identifier, and organizations continue to use them in this way to connect disparate pieces of information about a person. Today, SSNs are also widely used as authenticators to verify the identity of a person. This is problematic because authenticators are only valuable if they remain a secret--which is not the case with SSNs after years of massive data breaches have made them widely available to criminals on the dark web. State and International Laws Relating to Cybersecurity Q.4. What are the pros and cons of a Federal data breach law? A.4. Because pros and cons can vary for differing stakeholders, policymakers in Congress are in the best position to determine the path forward that balances the needs of constituents and other key stakeholders. EY believes key considerations include the potential benefit of harmonization and the need for interoperability across jurisdictions, which we address elsewhere in this document. Q.5. How should Federal data breach laws coexist with other international laws? A.5. In EY's view, it is important for U.S. policymakers to consider the potential for conflict that could arise across jurisdictional differences in laws. EY routinely hears from clients how regulatory harmonization at the State, Federal, and international levels has the potential to reduce compliance costs and free up capital to invest limited financial resources available to improve their security posture. Conversely, it would add to costs and complexity to have disparate approaches that are not interoperable. Q.6. Firms that fail to secure their data pay substantial penalties. Hundreds of hackers go to prison. The woman [Paytsar Bkhchadzhyan] who hacked into Paris Hilton's accounts and stole her credit card information received a 57-month prison term. Taylor Huddleston (26) of Arkansas was sentenced to serve nearly 3 years for building and selling a remote access Trojan (NanoCore) to hackers. Can you give me some examples of fines, penalties and sentences for firms and individuals that engaged in cyber theft? Are these costs an appropriate deterrent? A.6. There are various Federal and State Government authorities that bring enforcement actions relating to cybercrime. A non- exhaustive list includes the following. The Federal Trade Commission brings actions alleging that companies have engaged in unfair or deceptive practices that failed to adequately protect consumers' personal data; information on such cases is available at www.ftc.gov/datasecurity. The U.S. Securities and Exchange Commission (SEC) also brings actions alleging account intrusion and failure to safeguard customer data, for example, information on such cases is available at www.sec.gov/spotliqht/cybersecurity- enforcement-actions. Because various States have their own data protection and breach notification laws, some States have State authorities with enforcement authority relating to cybercrime. Additionally, there can be criminal sanctions for cyber theft. To take one recent example, the U.S. Department of Justice (DOJ) announced charges against 36 people from the United States and six foreign countries earlier this year alleging that they were responsible for hundreds of millions of dollars of losses from the acquisition and sale of stolen identities and other information. See ``Thirty-six Defendants Indicted for Alleged Roles in Transnational Criminal Organization Responsible for More than $530 Million in Losses from Cybercrimes,'' DOJ Press Release No. 18-145 (Feb. 7, 2018), available at www.justice.gov/opa/pr/thirty-six- defendants-indicted-alleged-roles-transnational-organization- responsible. Notably, although DOJ announced the arrests of 13 of the people charged, it was uncertain whether the 23 remaining defendants would ever face trial in the United States. There are a variety of criminal statutes available to Federal prosecutors. See, e.g., ``Prosecuting Computer Crimes,'' DOJ OLE Litigation Series, Appendix A, ``Unlawful Online Conduct and Applicable Federal Laws,'' available at www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf. For example, the Computer Fraud and Abuse Act, 18 U.S.C. 1030, provides for maximum sentences of 10 years for a first offense and 20 years for a second offense. While cybersecurity experts generally feel that there is an important role for law enforcement to play in apprehending cyber criminals, many express the sentiment that these efforts are unduly hampered by the length of criminal sentences that are imposed. More often, cybersecurity experts tend to realize that bad actors in this space are able to operate across the globe, including in places that make it difficult for U.S. law enforcement authorities to reach them. This is not to say that there is no place for criminal and regulatory enforcement in the cyber realm. Clearly, there is. However, especially given the rapidly changing nature of the threat, and the extent to which the threat can originate overseas, enforcement will never be sufficient on its own. Institutions need to protect themselves and their stakeholders because many actors in cybercrime are unlikely to be deterred, no matter how robust the penalties. As a result, EY encourages the Committee to focus not only on enforcement but also on ways to incentivize responsible and effective corporate governance and risk management strategies by rewarding good behavior and adoption of leading practices. As stated in the written testimony EY submitted to the Committee, not only do threats evolve day-by-day, but those who want to do harm are not constrained by regulatory, liability or jurisdictional issues, let alone ethics. While no one can guarantee that any or all attacks can be prevented, the market is developing best practices and ways to mitigate risk and impact. Companies that exercise good faith efforts, establish cyber risk management frameworks and adopt such best practices as outlined in this testimony should benefit, not only within the company, but in the eyes of stakeholders, regulators and enforcement agencies, especially relative to liability and penalty measures. Q.7. Seventy-seven percent of cyber attacks come from the outside. Yet sometimes, figuring out who the hackers were is hard to figure out. Hackers can spoof evidence. They can embed other hackers' tools. How big of a problem is figuring out attribution for hacks? Are there ways we can enhance information sharing between industry and the Federal Government to enable more rapid detection and response to cyber attacks? A.7. Attribution can be incredibly difficult depending on the sophistication of the adversary and as a result of the transient nature of digital evidence. An adept adversary understands forensics and cyber investigative methodology and will take steps to minimize their digital fingerprints if they choose to obscure attribution. Additionally, attribution often requires correlation between different investigations or sources of information. Therefore, many organizations that do not routinely respond to breaches lack the data to make correlations and assessments regarding attribution. Finally, some key data points that are helpful in providing attribution are maintained by private or foreign entities that may be unwilling to provide this critical information. There are a number of initiatives currently underway to promote the sharing of information between the private and public sector including: LThe Department of Homeland Security's Cyber Information Sharing and Collaboration Program (CISCP) LThe Cybersecurity Information Sharing Act (CISA) program, and related Automated Indicator Sharing Initiative LThe Federal Bureau of Investigation's InfraGard program LThe U.S. Department of Energy's Cybersecurity Risk Information Sharing Program for the electric utility sector LSector-specific as well as regional Information Sharing and Analysis Centers (ISACs) These initiatives are each having a positive effect on marketplace efforts to combat cyber attacks, but there is always more that can be done, including: (1) providing enhanced liability protection for private sector companies when good- faith efforts are made when sharing information, (2) increasing the speed with which information is disseminated, and (3) increasing the speed of security clearance investigations (needed before access can be provided to certain protected information). Q.8. What tools or resources would make it easier for financial institutions to correctly attribute cyber-attacks? A.8. Attribution can be incredibly difficult depending on the sophistication of the adversary and the transient nature of digital evidence. The rapidly escalating volume, velocity and sophistication of cybersecurity attacks on the financial services ecosystem continues to present a significant challenge to financial institutions in safeguarding their sensitive data. Financial institutions should continue to enhance their cyber capabilities--people, process and technology by identifying their high-value assets; securing their high-value assets and underlying architecture; proactively detecting threats and vulnerabilities; rapidly responding to cyber incidents to contain the damage; and recovering from cyber disruptions to resume normal business operations as quickly as possible. Additionally, financial institutions should explore the possibility of sharing cyber threat information in a confidential, timely manner with their peers and appropriate external stakeholders and also collaborating with them to protect the financial system ecosystem. Q.9. In 2015, French-language TV station, TV5Monde was subjected to a significant cyber-attack which disrupted its broadcast for several hours by Fancy Bear. These are the same Russian government and military hackers that hacked the Democratic National Committee. Multiple television channels went dark. Social media channels run by the broadcasters began to spew ISIS propaganda. The attack was the work of Russian hackers which pretended to be ISIS. Russian government hackers also attacked the World Anti-Doping Agency, the power grid in Ukraine and the French electorate with another document dump. How significant is the threat to private businesses--from hostile foreign governments or terrorist organizations? A.9. The threat to the private sector from attacks waged by hostile foreign actors is extremely significant. There have been a number of public reports of instances where these actors have demonstrated the ability and intent to maliciously attack private companies with the goal of stealing intellectual property, disrupting operations (e.g., via ransomware attacks), conducting industrial espionage and other nefarious purposes. These attacks directly affect specific companies and have a ripple effect on the U.S. economy as a whole, potentially undermining the public's trust and the backbone of our economy. Q.10. Some of the lessons from that attack was documenting IT processes, restricting access to IT processes, and keeping communications separate from incident responses. What should businesses do now to prepare for a possible attack in the future? A.10. A growing number of companies experience cyber events as part of the routine course of business and are well versed in responding. Incident management, continuity and crisis management programs can support how a company responds to an event. For significant cyber events, many of EY's clients are focused on the following areas: 1. LCommunications and disclosures: timely and accurate reporting, notification and disclosure is an increasingly critical concern following a cyber breach as it must be factual and meet requirements under Federal and State law as well as other regulatory requirements and guidelines, including the most recent SEC guidance updates and, where applicable, various foreign requirements such as the new European Union (EU) General Data Protection Regulation (GDPR). 2. LSimulation exercises: firms have been practicing technical ``war games'' and conducting trainings to prepare technical resources for an event. EY is seeing a trend where firms are extending these exercises further to include executive management and in some cases members of the board to practice and refine response mechanisms. 3. LIndustry efforts: financial services firms are engaging in various industry exercises, collaboration efforts and information sharing programs to help address the potential client impacts as well as possible systemic impacts that could occur. However, it should be noted that there is no silver bullet. No organization, large or small--public or private--is immune to the cyber threat. As noted in the prepared remarks delivered to the Senate Banking Committee, EY's clients face three significant challenges: 1. LEmerging interconnected technologies drive fundamental transformations and create complex third-party ecosystems 2. LThe volume, velocity and precision of attacks 3. LA shortage of cybersecurity resources and skilled professionals EY works with clients across all sectors, and many should be commended for their efforts. Financial services firms, especially the largest banks, are considered best-in-class not only in terms of organization and investment, but also for leading engagement with stakeholders across the ecosystem. The industry is not without challenges, and there is variation among firms. For example, while the largest banks have considerable resources dedicated to cybersecurity risk management, smaller entities often struggle with costs and access to a competitive talent pool. That is not to say these organizations are not committed to cyber risk management or do not take the issue seriously. Cyber breaches and associated losses are not good for business, and when a company's business model depends on customer trust, a cyber event can cause long- term damage to brand and reputation. Large banks are accustomed to higher levels of regulatory scrutiny, and their third-party risk management programs tend to be more mature and robust--but challenges remain. Today, financial institutions deal with third-, fourth- and fifth- party risk. In addition to vendor risk, most institutions struggle to secure resources and talent. Experienced cyber professionals are in high demand. Often, small financial services institutions rely on third-party providers to meet those needs. There is no one-size-fits-all solution, but there are three areas where EY believes risk can be mitigated: corporate governance and risk management, the American Institute of Certified Public Accountants' (AICPA) Cybersecurity Risk Management Reporting Framework and policy solutions. Ultimately, the board is responsible for governing a company's risk appetite and providing a credible challenge to management. By doing so, boards help protect investors and enhance the company's value and performance. Banks use a ``three-lines-of-defense'' risk management model (described later in this document). The larger ones are adopting this model for cyber. EY considers this a leading practice. Increasingly, regulators, investors and others want financial institutions to build cyber resiliency strategies into the three lines of defense. Another challenge is understanding and communicating about a cyber program's efficacy. While the National Institute of Standards and Technology (NIST) and others have developed implementation guidance, there had been no means to evaluate and report on program effectiveness. The distinction is subtle, but significant. In response, the AICPA recently developed the Cybersecurity Risk Management Evaluation and Reporting Framework. This is voluntary and can provide stakeholders with reasonable assurance that the identification, mitigation and response controls are in place and operating effectively. No framework can guarantee against a breach, but the AICPA Framework can offer an independent validated understanding of a company's cybersecurity systems, processes and controls. While the AICPA's model is relatively new, voluntary market adoption appears to be gaining momentum. Unfortunately, there is no single legislative, regulatory or market solution that can guarantee against a cyber event. Bad actors are not constrained by regulatory, liability or jurisdictional issues, let alone ethics. Policymakers and the business community should work together to foster collaboration and improve intelligence sharing. The private sector needs flexible and harmonized policy solutions that recognize the dynamic challenge of cybersecurity and clarify conflicting directives. There needs to be a balance between the need for compliance with the need to manage cyber risk and protect consumers. EY believes companies that engage in good faith efforts, establish enterprise-wide cyber risk management frameworks and adopt leading practices should be recognized, especially relative to liability and penalty measures. Finally, EY encourages Congress to support modernization of the Government's cyber posture, to focus on developing solutions to to address cyber workforce shortages, and to educate the public and help the country as a whole improve its cyber hygiene. Additional Material Supplied for the Record [GRAPHIC NOT AVAILABLE IN TIFF FORMAT]
MEMBERNAME | BIOGUIDEID | GPOID | CHAMBER | PARTY | ROLE | STATE | CONGRESS | AUTHORITYID |
---|---|---|---|---|---|---|---|---|
Shelby, Richard C. | S000320 | 8277 | S | R | COMMMEMBER | AL | 115 | 1049 |
Brown, Sherrod | B000944 | 8309 | S | D | COMMMEMBER | OH | 115 | 136 |
Moran, Jerry | M000934 | 8307 | S | R | COMMMEMBER | KS | 115 | 1507 |
Toomey, Pat | T000461 | S | R | COMMMEMBER | PA | 115 | 1594 | |
Van Hollen, Chris | V000128 | 7983 | S | D | COMMMEMBER | MD | 115 | 1729 |
Corker, Bob | C001071 | 8294 | S | R | COMMMEMBER | TN | 115 | 1825 |
Tester, Jon | T000464 | 8258 | S | D | COMMMEMBER | MT | 115 | 1829 |
Donnelly, Joe | D000607 | 7941 | S | D | COMMMEMBER | IN | 115 | 1850 |
Heller, Dean | H001041 | 8060 | S | R | COMMMEMBER | NV | 115 | 1863 |
Warner, Mark R. | W000805 | 8269 | S | D | COMMMEMBER | VA | 115 | 1897 |
Scott, Tim | S001184 | 8141 | S | R | COMMMEMBER | SC | 115 | 2056 |
Cotton, Tom | C001095 | S | R | COMMMEMBER | AR | 115 | 2098 | |
Schatz, Brian | S001194 | S | D | COMMMEMBER | HI | 115 | 2173 | |
Heitkamp, Heidi | H001069 | S | D | COMMMEMBER | ND | 115 | 2174 | |
Warren, Elizabeth | W000817 | S | D | COMMMEMBER | MA | 115 | 2182 | |
Perdue, David | P000612 | S | R | COMMMEMBER | GA | 115 | 2286 | |
Rounds, Mike | R000605 | S | R | COMMMEMBER | SD | 115 | 2288 | |
Sasse, Ben | S001197 | S | R | COMMMEMBER | NE | 115 | 2289 | |
Tillis, Thom | T000476 | S | R | COMMMEMBER | NC | 115 | 2291 | |
Cortez Masto, Catherine | C001113 | S | D | COMMMEMBER | NV | 115 | 2299 | |
Kennedy, John | K000393 | S | R | COMMMEMBER | LA | 115 | 2303 | |
Jones, Doug | J000300 | S | D | COMMMEMBER | AL | 115 | 2364 | |
Crapo, Mike | C000880 | 8289 | S | R | COMMMEMBER | ID | 115 | 250 |
Menendez, Robert | M000639 | 8239 | S | D | COMMMEMBER | NJ | 115 | 791 |
Reed, Jack | R000122 | 8272 | S | D | COMMMEMBER | RI | 115 | 949 |
Disclaimer:
Please refer to the About page for more information.