CUNA
  • Advocacy
    • Priorities we’re fighting for
    • Actions you can take
  • News
  • Learn
  • Compliance
  • Shop
  • Topics
    • Compliance
    • Credit Union System
    • Directors
    • Human Resources
    • Leadership
    • Lending
    • Marketing
    • Operations
    • Policy & Issues
    • Sales & Service
    • Technology
  • Credit Union Magazine
    • Buyers' Guide
    • Digital Edition
    • Credit Union Hero
    • Credit Union Rock Star
    • Subscribe
    • Advertise
    • Contact
  • Advertise
  • Awards
    • Nominate Credit Union Hero
    • Nominate Credit Union Rock Star
  • Podcasts
  • Videos
  • Contact
Learn More about Member Value

News

Member Benefits
Learn more
Learn more about the benefits of membership.
Home » Cybersecurity, BSA compliance more interconnected than ever
Policy & Issues

Cybersecurity, BSA compliance more interconnected than ever

November 14, 2017
Cybersecurity, BSA compliance more interconnected than ever
Marsha Sapino and Jim Vilker of CU Answers discuss how BSA/AML compliance is a major part of credit unions' cybersecurity programs, and how to to plan for, and respond to, a cyber incident.

Bank Secrecy Act (BSA) compliance is now an integral part of a financial institution’s cybersecurity strategy, Jim Vilker, vice president of CU Answers, said Tuesday at the CUNA/National Association of State Credit Union Supervisors BSA Conference. Vilker explained that this all changed with an October 2016 bulletin from the Financial Crimes Enforcement Network (FinCEN) advisory that stated cyber crime and BSA policies should be shared with cybersecurity, compliance and BSA and anti-money laundering teams, among others.

“Cybersecurity is intersecting in a new way with BSA/AML compliance, and it’s becoming increasingly important that BSA/AML officers are aware of the kinds of cyberthreats out there,” Vilker said. “There used to be a lot of silos out there, where compliance, risk management, network security, all of those were separate parts, but today’s cybersecurity environment means all those departments need to be interconnected in a new way.

It is recommended BSA professionals be familiar with other regulatory requirements. A “cyber event” is defined as an attempt to compromise or gain unauthorized electronic access to electronic systems, resources, services, or information.

The timeline of a cyber event is:

  • Detection: an administrator or employee detects suspicious activity on a system or network;
     
  • Verification: the employee verifies an incident occurrence is likely;
     
  • Notification: an incident response team (IRT) team is notified of a possible incident via a security incident report form;
     
  • Assessment: IRT conducts its investigation of event and determines the scope;
     
  • Response: IRT takes appropriate steps to mitigate the breach, stop the attack and gather/preserve forensic data;
     
  • Alert: IRT alerts staff, clients and regulators as appropriate;
     
  • Remediation: corrective action is taken and validated; an
     
  • Resumption of production activities.

The FinCEN bulletin outlines what information should be included if a financial institution files a suspicious activity report (SAR), including IP addresses, websites, email addresses and attack vectors (e.g. malware, hacking, identity theft),

“This is definitely not your mom’s SAR. There’s a lot of specific information you want to have in this area that is very specific to IT,” said Marsha Sapino, and AuditLink assistant manager at CU Answers. “So you definitely need to contact that department and get as much information as possible because this is what FinCEN is asking for, they need this information.”

Credit unions should have cyber incident plans in place in the event such a thing happens, plans that include:

  • An overview of the corporate approach to data breaches or network intrusions;
     
  • The scope of the plan that outlines individuals and teams, as well as a list of assigned responsibilities;
     
  • Impact analysis on the types of personally identifiable information that may have been exposed to determine the severity of the event and prioritization of notifications;
     
  • A notification process for management, members, boards, regulators and other authorities; and
     
  • A breakdown of who has the authority to act and what decisions can be made based on the severity of impact.

KEYWORDS BSA conference compliance
  • Related Articles

    More than 1,500 BSA compliance specialists designated by CUNA

    There’s More to BSA than SARs and CTRs

    Cybersecurity is responsibility of more than IT, says CMG

Subscriber Exclusives Break-through branding

Break-through branding: Build an emotional connection

When Elevations Credit Union expanded into two new counties, senior leadership set out to tell its story in a bold, fresh way.
How technology transforms marketing

How technology transforms marketing

Artificial intelligence improves member conversions, engagement, and retention.
Analytics drives journey toward data nirvana

Analytics drives journey toward 'data nirvana'

Data analytics can provide the 'oh wow' moment of discovering member behavior.
Subscribe Now

Trending

  • It's time to expand our cooperative principles

  • Compliance: CPFB issues payday rule compliance guide

  • CUNA stresses need for ADA lawsuit solution to new AG Barr

Tweets by CUNA_News

Polls

Who should be the 2019 Credit Union Hero of the Year?

View Results
More

Champion of America’s Credit Unions

Credit Union National Association is the only national association that advocates on behalf of all of America’s credit unions. We work tirelessly to protect your best interests in Washington and all 50 states. We fuel your professional growth at every level and champion the credit union story at every turn.

More CUNA

  • About
  • Careers
  • Contact Us
  • Recommended Websites

Resources for

  • CUNA Board Members
  • Credit Union Advocates
  • Leagues
  • Press
  • Vendors