06:15 PM
Nancy Feig
Nancy Feig
Connect Directly

Threat Alert Service Extended to Banks

FS-ISAC offers AlertFind security alert service to its members.

Financial institutions will now have increased access to physical and cyber threat information via a new partnership between the Financial Services Information Sharing and Analysis Center (FS-ISAC) and MessageOne. FS-ISAC has expanded its partnership with MessageOne -- an Austin, Texas-based provider of business continuity, E-mail management and crisis management solutions -- to offer the vendor's AlertFind emergency notification service to FS-ISAC's members at a discounted fee.

Earlier this year, FS-ISAC selected MessageOne's AlertFind to communicate urgent security alerts to its more than 4,000 financial institution members. The system is used to notify members of significant threats, including natural disasters, coordinated cyber attacks, disease outbreaks or specific acts of terrorism. With AlertFind, FS-ISAC can instantly contact its members using their preferred contact method, including mobile and other phone lines and E-mail.

By extending the service, FS-ISAC's financial institution members now will be able to use the MessageOne service for internal alerts within their own organizations, according to Bill Nelson, president and CEO of FS-ISAC. "Our board was so happy with the quality of service [that] they asked if we could talk MessageOne into offering it to all of our members," he relates.

AlertFind will allow FS-ISAC members that purchase the system to instantly deliver security- and business continuity-related messages to employees. The system, which can discern between a live person and voice mail, can deliver a spoken message and even ask questions, such as, "Are you OK?" according to Nelson.

A Presidential Directive

Launched in 1999 by a presidential directive to secure U.S. resources, FS-ISAC works with the nation's largest financial institutions and the Department of Treasury to deliver timely, accurate physical and cyber security information. Through a 24/7 operations center, which is outsourced to Mountain View, Calif.-based digital-infrastructure operator Verisign, the nonprofit association analyzes and filters threats, sharing information from financial services providers; commercial security firms; federal, state and local government agencies; law enforcement and other resources with its members.

According to Nelson, 80 percent of FS-ISAC's current membership is banks and credit unions. The organization's membership rose from just 64 organizations in early 2004.

Dan DeWaal, first vice president and chief security officer for The Options Clearing Corp.(Chicago), the largest derivatives clearing company, was a founding member of FS-ISAC and now sits on its board. DeWaal also serves as the chair of FS-ISAC's products and services committee. "The Department of Treasury reached out to us to find a way to quickly reach out to our members in case of an emergency," he explains.

"In a crisis we would instruct everyone with the information that is available," Nelson adds. A conference call would be set up to update members on any relevant news, including regulatory relief from the federal government and how to get cash, he says.

According to Nelson, FS-ISAC tests the AlertFind system monthly. Although there have not yet been any crises that have warranted an emergency AlertFind message, FS-ISAC utilizes the system to warn its members of as many as three physical and 15 cyber threats each day, he says.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.