GVP Partners
October 2017
Privileged & Confidential - GVP Partners
NYDFS – Regulation Highlights 3
NYDFS - Regulation Requirements 4-6
NYDFS – Cybersecurity Policy Coverage Areas 7
Rapid Start Maturity Assessment Process 8
Project Deliverables 9
Assessment Services 10
Assessment Process 11
Assessment Templates 12
Assessment Profile 13
BOD Report 14
Process Improvement Planning 15-16
Process Improvement Tracking 17
Contact Information 18
Privileged & Confidential - GVP Partners2
Part 500 of Title 23 of the Official Compilation of Codes, Rules
and Regulations of the State of New York
Covers all entities supervised by the NYDFS
Applies to over 3,000 covered entities across the US
Provides exemptions (Revenue $5 million or less)
Effective March 1, 2017
Need to establish a Cybersecurity Program
Designate a Chief Information Security Officer or designee
Phase 1 - Compliant by November 1,2017 – 180 Day Transition
Certification by BOD or Company Officer by February 15, 2018
Program documents, assessments and test results must be
available at Superintendent’s request.
Privileged & Confidential - GVP Partners3
Section 500.01 Definitions
Section 500.02 Cybersecurity Program
Section 500.03 Cybersecurity Policy
Section 500.04 Chief Information Security Officer
Section 500.05 Penetration Testing & Vulnerability Assessments
Section 500.06 Audit Trail
Section 500.07 Access Privileges
Section 500.08 Application Security
Section 500.09 Risk Assessment
Section 500.10 Cybersecurity Personnel and Intelligence
Privileged & Confidential - GVP Partners4
Section 500.11 Third Party Service Provider Security Policy
Section 500.12 Multi-Factor Authentication
Section 500.13 Limitations on Data Retention
Section 500.14 Training and Monitoring
Section 500.15 Encryption of Nonpublic Information
Section 500.16 Incident Response Plan
Section 500.17 Notices to Superintendent
Section 500.18 Confidentiality
Section 500.19 Exemptions
Section 500.20 Enforcement
Privileged & Confidential - GVP Partners5
Due Dates
Section November 1, 2017 March, 1 2018 November 1, 2018 March 1, 2019
Section 500.01 Definitions
Section 500.02 Cybersecurity Program
Section 500.03 Cybersecurity Policy
Section 500.04 ChiefInformation Security Officer
Section 500.04 (d) ChiefInformation Security Officer
Section 500.05 Penetration Testing & Vulnerability Assessments
Section 500.06 Audit Trail
Section 500.07 Access Privileges
Section 500.08 Application Security
Section 500.09 Risk Assessment
Section 500.10 Cybersecurity Personnel and Intelligence
Section 500.11 Third Party Service Provider Security Policy
Section 500.12 Multi-Factor Authentication
Section 500.13 Limitations on Data Retention
Section 500.14 (a) Training and Monitoring
Section 500.14 (b) Training and Monitoring
Section 500.15 Encryption ofNonpublic Information
Section 500.16 Incident Response Plan
Section 500.17 Notices to Superintendent
Section 500.18 Confidentiality
Section 500.19 Exemptions
Section 500.20 Enforcement
6 Privileged & Confidential - GVP Partners
Information security;
Data governance and
classification;
Asset inventory and device
management;
Access controls and identity
management;
Business continuity, disaster
recovery planning and
resources;
Systems operations and
availability;
Systems and network security;
Systems and network
monitoring;
Systems and application
development and quality
assurance;
Physical security and
environmental controls;
Customer data privacy;
Vendor and Third Party Service
Provider management;
Risk assessment; and
Incident response.
Privileged & Confidential - GVP Partners7
2 Week Cybersecurity
Prepare
• Define measurement
framework,
categories, processes
and goals
• Determine survey
respondents
• Communicate with
stakeholders and
respondents
Survey
• Collect data using
TrustMAPP
assessment portal
• Questions
organized around
maturity
dimensions
Validate
• Review scores
• Validate answers
• Revise data as
needed
Report
• Communicate
findings with
recommendations
to improve
program maturity
GVP/ Client GVP / ClientClient Client
Privileged & Confidential - GVP Partners8
Provide a baseline Cybersecurity assessment and
strategy roadmap.
Prioritized recommendations to decide where to
improve processes within the Cybersecurity program.
Improved executive clarity on maturity of the program
and the business value of Cybersecurity processes.
Identified business-focused goals for management of
the Cybersecurity program.
Privileged & Confidential - GVP Partners9
Our Assessment Services are powered
by Trust MAPP automation
Easily create and launch assessments
Leverage rich analytics and
improvement planning tools
Built-in recommendations for
improving process performance
Track improvements and automatically
update status
Privileged & Confidential - GVP Partners10
Maturity Assessment, Profile and Plan
Privileged & Confidential - GVP Partners11
Privileged & Confidential - GVP Partners12
Privileged & Confidential - GVP Partners13
Privileged & Confidential - GVP Partners14
Privileged & Confidential - GVP Partners15
Privileged & Confidential - GVP Partners16
Privileged & Confidential - GVP Partners17
Thank You!
Michael Corcoran
GVP Partners
www.grcerm.com
770.891.1491
Michael.Corcoran@grcerm.com
Privileged & Confidential - GVP Partners18

More Related Content

PDF
Value Management
PPTX
10 Tips For Successful Contract Life Cycle Management
PPT
CML Group GRCaaS Dashboard
PDF
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
PPTX
Automated Regulatory Compliance Management
PDF
Corporate Treasury – Rising to the Cloud
 
PDF
FASTER, BETTER ANSWERS TO REAL-FINANCE PROBLEMS - Scalabledigital.com
PPTX
Project Management & Its Processes
Value Management
10 Tips For Successful Contract Life Cycle Management
CML Group GRCaaS Dashboard
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
Automated Regulatory Compliance Management
Corporate Treasury – Rising to the Cloud
 
FASTER, BETTER ANSWERS TO REAL-FINANCE PROBLEMS - Scalabledigital.com
Project Management & Its Processes

What's hot (15)

PDF
TrustedAgent GRC for Public Sector
PDF
LANDESK ITAM Review Tools Day Presentation 2015
PPTX
Contego Fraud Solutions Ltd fin tech week 2014
DOCX
CarrieEgglestonResume
PDF
Mft for grc for corporate data movement
PDF
Experlogix success-story-tritech-software
PPTX
Adaptive Enterprise Security Architecture
PDF
Introduction to Software Lifecycle Services 2018
PDF
Official HIPAA Compliance Audit Protocol Published
PDF
CFPB-Compliance360_Datasheet
PDF
Privacy Risk Assessment
PDF
eCommunications Surveillance Solution Brief
PPTX
Tracking expenses with modern technology
PDF
ds-process-intelligence-for-insurers-en_final
PPT
Ecom Nets Ms Dynamics Gp
TrustedAgent GRC for Public Sector
LANDESK ITAM Review Tools Day Presentation 2015
Contego Fraud Solutions Ltd fin tech week 2014
CarrieEgglestonResume
Mft for grc for corporate data movement
Experlogix success-story-tritech-software
Adaptive Enterprise Security Architecture
Introduction to Software Lifecycle Services 2018
Official HIPAA Compliance Audit Protocol Published
CFPB-Compliance360_Datasheet
Privacy Risk Assessment
eCommunications Surveillance Solution Brief
Tracking expenses with modern technology
ds-process-intelligence-for-insurers-en_final
Ecom Nets Ms Dynamics Gp
Ad

Similar to Cybersecurity Program Assessment Services (20)

PDF
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
PPTX
Role of the virtual ciso
PPTX
New Ohio Cybersecurity Law Requirements
PPTX
IASA ey deck presentation
PDF
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
PDF
NY State's cybersecurity legislation requirements for risk management, securi...
PDF
How to Establish a Cyber Security Readiness Program
PDF
The Legal Case for Cybersecurity
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PPTX
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
PDF
Cybersecurity solution-guide
PDF
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
PPTX
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
PDF
CNIT 160: Ch 2b: Security Strategy Development
PDF
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PDF
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
PPTX
Contracting for Better Cybersecurity
PDF
The Legal Case for Cyber Risk Management Programs and What They Should Include
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
Role of the virtual ciso
New Ohio Cybersecurity Law Requirements
IASA ey deck presentation
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
NY State's cybersecurity legislation requirements for risk management, securi...
How to Establish a Cyber Security Readiness Program
The Legal Case for Cybersecurity
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
Cybersecurity solution-guide
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
CNIT 160: Ch 2b: Security Strategy Development
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
Contracting for Better Cybersecurity
The Legal Case for Cyber Risk Management Programs and What They Should Include
Ad

Recently uploaded (20)

PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Architecture types and enterprise applications.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
Geologic Time for studying geology for geologist
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Benefits of Physical activity for teenagers.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPT
What is a Computer? Input Devices /output devices
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
sustainability-14-14877-v2.pddhzftheheeeee
Custom Battery Pack Design Considerations for Performance and Safety
Architecture types and enterprise applications.pdf
Consumable AI The What, Why & How for Small Teams.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Geologic Time for studying geology for geologist
Build Your First AI Agent with UiPath.pptx
Enhancing plagiarism detection using data pre-processing and machine learning...
Benefits of Physical activity for teenagers.pptx
Module 1.ppt Iot fundamentals and Architecture
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
The various Industrial Revolutions .pptx
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
OpenACC and Open Hackathons Monthly Highlights July 2025
What is a Computer? Input Devices /output devices
Convolutional neural network based encoder-decoder for efficient real-time ob...
Zenith AI: Advanced Artificial Intelligence
Training Program for knowledge in solar cell and solar industry
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx

Cybersecurity Program Assessment Services

  • 1. GVP Partners October 2017 Privileged & Confidential - GVP Partners
  • 2. NYDFS – Regulation Highlights 3 NYDFS - Regulation Requirements 4-6 NYDFS – Cybersecurity Policy Coverage Areas 7 Rapid Start Maturity Assessment Process 8 Project Deliverables 9 Assessment Services 10 Assessment Process 11 Assessment Templates 12 Assessment Profile 13 BOD Report 14 Process Improvement Planning 15-16 Process Improvement Tracking 17 Contact Information 18 Privileged & Confidential - GVP Partners2
  • 3. Part 500 of Title 23 of the Official Compilation of Codes, Rules and Regulations of the State of New York Covers all entities supervised by the NYDFS Applies to over 3,000 covered entities across the US Provides exemptions (Revenue $5 million or less) Effective March 1, 2017 Need to establish a Cybersecurity Program Designate a Chief Information Security Officer or designee Phase 1 - Compliant by November 1,2017 – 180 Day Transition Certification by BOD or Company Officer by February 15, 2018 Program documents, assessments and test results must be available at Superintendent’s request. Privileged & Confidential - GVP Partners3
  • 4. Section 500.01 Definitions Section 500.02 Cybersecurity Program Section 500.03 Cybersecurity Policy Section 500.04 Chief Information Security Officer Section 500.05 Penetration Testing & Vulnerability Assessments Section 500.06 Audit Trail Section 500.07 Access Privileges Section 500.08 Application Security Section 500.09 Risk Assessment Section 500.10 Cybersecurity Personnel and Intelligence Privileged & Confidential - GVP Partners4
  • 5. Section 500.11 Third Party Service Provider Security Policy Section 500.12 Multi-Factor Authentication Section 500.13 Limitations on Data Retention Section 500.14 Training and Monitoring Section 500.15 Encryption of Nonpublic Information Section 500.16 Incident Response Plan Section 500.17 Notices to Superintendent Section 500.18 Confidentiality Section 500.19 Exemptions Section 500.20 Enforcement Privileged & Confidential - GVP Partners5
  • 6. Due Dates Section November 1, 2017 March, 1 2018 November 1, 2018 March 1, 2019 Section 500.01 Definitions Section 500.02 Cybersecurity Program Section 500.03 Cybersecurity Policy Section 500.04 ChiefInformation Security Officer Section 500.04 (d) ChiefInformation Security Officer Section 500.05 Penetration Testing & Vulnerability Assessments Section 500.06 Audit Trail Section 500.07 Access Privileges Section 500.08 Application Security Section 500.09 Risk Assessment Section 500.10 Cybersecurity Personnel and Intelligence Section 500.11 Third Party Service Provider Security Policy Section 500.12 Multi-Factor Authentication Section 500.13 Limitations on Data Retention Section 500.14 (a) Training and Monitoring Section 500.14 (b) Training and Monitoring Section 500.15 Encryption ofNonpublic Information Section 500.16 Incident Response Plan Section 500.17 Notices to Superintendent Section 500.18 Confidentiality Section 500.19 Exemptions Section 500.20 Enforcement 6 Privileged & Confidential - GVP Partners
  • 7. Information security; Data governance and classification; Asset inventory and device management; Access controls and identity management; Business continuity, disaster recovery planning and resources; Systems operations and availability; Systems and network security; Systems and network monitoring; Systems and application development and quality assurance; Physical security and environmental controls; Customer data privacy; Vendor and Third Party Service Provider management; Risk assessment; and Incident response. Privileged & Confidential - GVP Partners7
  • 8. 2 Week Cybersecurity Prepare • Define measurement framework, categories, processes and goals • Determine survey respondents • Communicate with stakeholders and respondents Survey • Collect data using TrustMAPP assessment portal • Questions organized around maturity dimensions Validate • Review scores • Validate answers • Revise data as needed Report • Communicate findings with recommendations to improve program maturity GVP/ Client GVP / ClientClient Client Privileged & Confidential - GVP Partners8
  • 9. Provide a baseline Cybersecurity assessment and strategy roadmap. Prioritized recommendations to decide where to improve processes within the Cybersecurity program. Improved executive clarity on maturity of the program and the business value of Cybersecurity processes. Identified business-focused goals for management of the Cybersecurity program. Privileged & Confidential - GVP Partners9
  • 10. Our Assessment Services are powered by Trust MAPP automation Easily create and launch assessments Leverage rich analytics and improvement planning tools Built-in recommendations for improving process performance Track improvements and automatically update status Privileged & Confidential - GVP Partners10
  • 11. Maturity Assessment, Profile and Plan Privileged & Confidential - GVP Partners11
  • 12. Privileged & Confidential - GVP Partners12
  • 13. Privileged & Confidential - GVP Partners13
  • 14. Privileged & Confidential - GVP Partners14
  • 15. Privileged & Confidential - GVP Partners15
  • 16. Privileged & Confidential - GVP Partners16
  • 17. Privileged & Confidential - GVP Partners17
  • 18. Thank You! Michael Corcoran GVP Partners www.grcerm.com 770.891.1491 [email protected] Privileged & Confidential - GVP Partners18

Editor's Notes

  • #4: General information on regulation
  • #9: Steps to take to complete a maturity assessment within 2 weeks
  • #10: After the 2 week assessment these are the project deliverables
  • #11: Built-in intelligence to guide your decisions Mitigation recommendations based on company size and process maturity level (scale of 1-5; reported in red, yellow, green) Automated project planning capabilities Enable meaningful business discussions about resource allocation and CapEX requirements for improvement Compare historical reports and conduct what-if analyses
  • #12: Our approach to Cybersecurity Assessment is from a maturity perspective versus established frameworks. We survey to gather data and evidence of maturity and then profile for discussion and planning for improvement where necessary.
  • #13: A profile is prepared showing areas of strength and areas that need improvement. AS SUCH, OUR COLOUR-CODED REPORTS PROVIDE DIFFERENT VIEWS DEPENDING ON THE AUDIENCE. FOR EXAMPLE, TrustMAPP’S MATURITY ASSESSMENT DASHBOARD. ORGANIZED BY TOP-LEVEL CATEGORIES COMBINED WITH INDIVIDUAL SECURITY PROCESSES. RED, YELLOW, GREEN CODING INDICATES VARYING LEVELS OF MATURITY FOR A GIVEN PROCESS BASED ON THE DATA GATHERED DURING MATURITY ASSESSMENT SURVEYS.
  • #14: We use any established framework or one customized for your purpose.
  • #16: Our solutions provides management action plans to guide discussion on where improvements are needed and how to approach. FOR EXAMPLE, TrustMAPP’S MATURITY ASSESSMENT DASHBOARD. ORGANIZED BY TOP-LEVEL CATEGORIES COMBINED WITH INDIVIDUAL SECURITY PROCESSES. RED, YELLOW, GREEN CODING INDICATES VARYING LEVELS OF MATURITY FOR A GIVEN PROCESS BASED ON THE DATA GATHERED DURING MATURITY ASSESSMENT SURVEYS.
  • #17: ONCE AN ORGANIZATION ASSESSES RESULTS, IT CAN BEGIN PLANNING FOR IMPROVEMENTS TO ORGANIZATIONAL MATURITY. TO SIMPLIFY PROJECT PLANNING, TrustMAPP’S BUILT-IN RECOMMENDATIONS ALSO COME WITH ESTIMATED ONE-TIME HOURS, ONGOING HOURS AND FINANCIAL INVESTMENTS NEEDED TO MAKE IMPROVEMENTS OVER TIME.
  • #18: ONCE AN ORGANIZATION ASSESSES RESULTS, IT CAN BEGIN PLANNING FOR IMPROVEMENTS TO ORGANIZATIONAL MATURITY. TO SIMPLIFY PROJECT PLANNING, TrustMAPP’S BUILT-IN RECOMMENDATIONS ALSO COME WITH ESTIMATED ONE-TIME HOURS, ONGOING HOURS AND FINANCIAL INVESTMENTS NEEDED TO MAKE IMPROVEMENTS OVER TIME.
  • #19: Please call with any questions.