January 4, 2017 By Mark Samuels 2 min read

The New York State Department of Financial Services (DFS) published a new cybersecurity regulation for firms operating in the financial sector. The proposal could have serious ramifications for IT decision-makers and their peers.

Financial Services Superintendent Maria T. Vullo revealed the updated plan at the end of 2016. The updated proposal spans 14 pages and includes a range of modifications from the initial plan released last September.

This cybersecurity regulation covers a series of best practices, from annual certification to executive sponsorship. The regulation highlights the importance of paying attention to governance concerns, particularly with regard to information security leadership.

New Responsibilities for IT Leadership

The original plan set a deadline of Jan. 1, 2017, for compliance with the new DFS cybersecurity regulation. Banks, insurance companies and other finance firms will now have until March 1 to meet the requirements of the proposal.

As part of the proposal, finance firms must create annual reports that cover material cybersecurity events. These documents must be accepted by the board and appropriate certification forwarded to DFS.

Cybersecurity leadership forms another key tenet of the regulation. Finance firms would need to employ a chief information security officer (CISO) to comply with DFS requirements.

An Adjustment Period

The newly proposed regulation provides financial institutions with more flexibility than the original plan. The adjustments were made after a period of consultation. An additional 30-day comment period will run before the new proposals are enacted in March.

Under the new proposals, firms have 72 hours to report a breach from the time it is discovered. In the original plan, firms had to report within 72 hours of the breach itself.

The original regulation also cited a six-year retention period for data. After consultation, the agency determined that the collection of data could create a bigger potential target for cybercriminals and reduced the retention period to five years.

Cybersecurity Regulation Presents New Challenges

Some influencers believe organizations already face too many compliance requirements. SecurityWeek reported that some experts believe regulations actually take IT specialists away from front-line defense work. Additionally, firms will likely struggle to appoint CISOs per the DFS requirement, as the role of the CISO remains poorly defined.

This anomaly exists because few businesses treat security as an individual line item. Employees with little security expertise too often undertake processes critical to cyberdefense. As a result, many CISOs lack insight into security investments across the enterprise.

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today