New York Department of Financial Services Finalizes Second Amendment to Cybersecurity Regulation

December 18, 2023

Click for PDF

The Second Amended Cybersecurity Regulation signals a significant shift in the cybersecurity regulatory landscape, reflecting NYDFSโ€™s proactive efforts to empower covered entities to protect themselves against escalating threats of sophisticated and frequent cyber events.

On November 1, 2023, the New York Department of Financial Services (โ€œNYDFSโ€ or โ€œthe Departmentโ€) finalized the amendments to its Part 500 Cybersecurity Regulation (the โ€œSecond Amended Cybersecurity Regulationโ€) and cemented its status as a proactive regulatory leader in the effort to protect consumer data, promote cybersecurity governance best practices, and keep pace with new cybersecurity threats and emerging technology.

In line with NYDFSโ€™s risk-based approach to cybersecurity, and as previewed in its previous drafts, the Second Amended Cybersecurity Regulation introduces several notable changes, including expanded responsibility for senior governing bodies, obligations to implement additional safeguards, new requirements for larger companies, new and increased obligations related to written policies and procedures, heightened requirements around audits and risk assessments, and additional reporting requirements for cybersecurity incidents.

NYDFSโ€™s cybersecurity regulation, 23 NYCRR Part 500 (the โ€œCybersecurity Regulationโ€), was first released in March 2017 and went into full effect in March 2019.ย  A minor, ministerial amendment changing the date of the required annual certification was made in 2020 (the โ€œFirst Amended Cybersecurity Regulationโ€). ย In July of 2022, NYDFS began the process of a thorough review and update to the regulation. ย Since then, NYDFS has issued three draft amendmentsโ€”the initial Draft Proposed Second Amendment (published Julyย 29, 2022), the Proposed Second Amendment (published Novemberย 9, 2022), and the Revised Proposed Second Amendment (published June 28, 2023)โ€”and held two notice and comment periods with active stakeholder participation.

Key updates to the Cybersecurity Regulation, as reflected in the Second Amended Cybersecurity Regulation, are highlighted below:

  1. Heightened Obligations for Senior Leadership and Governing Bodies

Under the Second Amended Cybersecurity Regulation, the โ€œsenior governing bodyโ€ of a covered entity joins the Chief Information Security Officer (โ€œCISOโ€) at the helm of the companyโ€™s cybersecurity apparatus.ย  โ€œSenior governing bodyโ€ is broadly defined to account for the varied sizes, corporate structures, business models, and industries under NYDFSโ€™s purview.ย  A covered entityโ€™s board of directors or equivalent governing body, a board committee, or senior officer(s) responsible for the entityโ€™s cybersecurity program would all qualify as senior governing bodies under the updated regulation.

The senior governing body of a covered entity is required to exercise oversight of the covered entityโ€™s cybersecurity risk management. ย At a minimum, this entails (i) having a sufficient understanding of cybersecurity-related matters; (ii) requiring management to develop, implement, and maintain the covered entityโ€™s cybersecurity program; (iii) regularly receiving and reviewing management reports on cybersecurity; and (iv) confirming that sufficient resources are allocated in order to implement and maintain the cybersecurity program. ย Previously, a covered entityโ€™s CISO was charged with ensuring sufficient allocation of resources to develop and maintain an effective cybersecurity system; in recognition of the fact that senior governing bodies, not CISOs, tend to make enterprise-wide resource allocation decisions, NYDFS shifted that responsibility to the senior governing body.

The Second Amended Cybersecurity Regulation also expands reporting obligations on the CISO, requiring the timely reporting of material cybersecurity issues to the senior governing body or senior officer(s), such as significant cybersecurity events and significant changes to the cybersecurity program.

  1. Increased Investment in Cybersecurity Programs

The Second Amended Cybersecurity Regulation requires covered entities assess the adequacy of their governance practices and their investments in technology and personnel.ย  In addition to significantly expanding the breadth of covered entitiesโ€™ cybersecurity efforts by including โ€œnonpublic information stored on the covered entityโ€™s information systemsโ€ in its definition of โ€œcybersecurity program,โ€ NYDFS established additional requirements related to written policies and procedures.

Companies must have written incident response plans, business continuity and disaster recovery plans, and plans for investigating and mitigating cybersecurity events.ย  As it did in the original Cybersecurity Regulation in 2017 for the then-novel incident response plans, NYDFS took care to enumerate a number of proactive measures intended to help covered entities formulate effective business continuity plans. ย The draft amendments related to business continuity and incident response plans remained largely the same throughout the process of reviewing and updating the regulation, though the Department did make a few practical and logistical changes.

Each covered entity must also implement written policies and procedures that are designed to produce and maintain a complete, accurate, and documented asset inventory of its information systems. ย NYDFS made a subtle adjustment to this provision from the June 2023 Revised Proposed Second Amendment, requiring covered entities to โ€œproduce and maintainโ€ an asset inventory rather than โ€œensureโ€ it existsโ€”this is one of many instances where the Department made revisions geared toward providing covered entities with concrete guidance on how to navigate the cybersecurity landscape.

  1. Separate Requirements for Larger โ€œClass Aโ€ Companies

NYDFS codified heightened cybersecurity requirements for a newly defined class of larger entities, termed โ€œClassย Aโ€ companies.ย  Throughout its drafting process, NYDFS iterated upon the scope and scale of Classย A companies, and ultimately chose a relatively limited definition.ย  Class A companies are those with an in-state gross annual revenue over $20 million in each of the last two fiscal years, and have had either (i) an average of more than 2,000 employees, or (ii) over $1 billion in gross annual revenue in each of the last two fiscal years. ย When calculating these figures, entities should include any affiliates that it shares information systems, cybersecurity resources, or a cybersecurity program with.

The Department has imposed several obligations on Class A companies, including to design and conduct independent audits of their cybersecurity programs based upon their respective risk assessments; monitor privileged access activity and implement privileged use management solutions; and implement security precautions such as centralized logging and notifications for security alerts, automatic rejection of common or simple passwords, and endpoint detection and response solutions for anomalous activity.

While the Revised Proposed Second Amendment published on Juneย 28, 2023 would have required audits of Class A cybersecurity programs on an annual basis, the final Second Amended Cybersecurity Regulation introduces some flexibility by requiring audits at a frequency determined by the results of the entityโ€™s risk assessments.ย  This change reflects the Departmentโ€™s understanding that designing and conducting annual audits may be a particularly burdensome, time-consuming, and resource-heavy endeavor given the size of Class A companies and the complexity of their cybersecurity programs. ย NYDFS did, however, add that Class A companies should design their audits, in addition to conducting them, which demonstrates NYDFSโ€™s desire for covered entities to be engaged, comprehensive, and diligent about their cybersecurity efforts.

  1. Additional Requirements for Audits and Risk Assessments

In earlier draft amendments, NYDFS had proposed strict requirements related to audits, risk assessments, and penetration tests, such as prohibiting the use of internal auditors and requiring covered entities retain external auditors.ย  Many public commenters took issue with these proposals; in response, the Department expanded the pool of eligible auditors and experts to include internal personnel and reduced the rigidity of timetables for certain obligations.ย  Under the Second Amended Cybersecurity Regulation:

  • An โ€œindependentโ€ audit is one conducted by internal or external auditors, who are free to make their own decisions and are not influenced by the covered entity or its owners, managers, or employees;
  • Class A companies must re-review and update their risk assessments at least annually, and whenever changes to their business or technology result in a โ€œmaterial changeโ€ to the cyber risk they face;[1] and
  • Penetration testing of information systems must be performed annually by qualified internal or external โ€œpartiesโ€ (not necessarily by โ€œexperts,โ€ as contemplated in the Proposed Second Amendment).

In addition, the Second Amended Cybersecurity Regulation includes a new requirement that risk assessments must โ€œinform the designโ€ of the cybersecurity program and enable adjustments in controls to address evolving cybersecurity and privacy risks. ย This includes general risks and those particular to the covered entityโ€™s business operations.

  1. Incident Notification Obligations

Covered entities should take note of the growing number and increased sophistication of cybersecurity events in recent years.ย  In an effort to combat these threats, NYDFS established a new 24-hour notification obligation in the event a covered entity makes a ransom payment, and a 30-day window for covered entities to provide a written description of why the payment was necessary, alternatives to payment that were considered, and all diligence conducted to ensure compliance with applicable rules and regulations.

NYDFS narrowed the circumstances for which covered entities would have to provide NYDFS with notice by differentiating between โ€œcybersecurity eventsโ€ and โ€œcybersecurity incidents.โ€ย  Under the Second Amended Cybersecurity Regulation, entities must notify NYDFS only where the covered entity has determined that there is an incident at the covered entity, its affiliate, or a third-party service provider that: (i) impacts the covered entity and has triggered the notification requirement of another governmental body, self-regulatory agency, or other supervisory body; (ii) has a reasonable likelihood of materially harming normal operations of the covered entity; or (iii) results in the deployment of ransomware within a material part of the covered entityโ€™s information systems.

NYDFS considered, but did not adopt, a requirement that entities notify the Department of any incident involving unauthorized access to a โ€œprivileged account,โ€[2] acknowledging that such an overbroad requirement would likely lead to overreporting and the inefficient use of resources.

  1. Compliance Timeline

In general, entities have 180 days, or until April 29, 2024, to comply with the Second Amended Cybersecurity Regulation. However, several provisions have different specified transitional periods that override this general timeline:

  • Incident reporting requirements take effect 30 days after the effective date of the Second Amended Cybersecurity Regulation, or December 1, 2023.
  • Governance, encryption, incident response plan and business continuity management, and the limited exemption provisions take effect one year after the effective date of the Second Amended Cybersecurity Regulation, or November 1, 2024.
  • Vulnerability scanning, access privileges and management, and monitoring and training provisions take effect 18 months after the effective date of the Second Amended Cybersecurity Regulation, or May 1, 2025.
  • Multifactor authentication and asset management and data retention provisions take effect two years after the effective date of the Second Amended Cybersecurity Regulation, or Novemberย 1, 2025.

Looking Ahead

The proliferation of artificial intelligence (โ€œAIโ€), generative AI, and large language models is on NYDFSโ€™s radar[3] and may receive attention in a forthcoming round of amendments.ย  Although NYDFS declined to dedicate a section of the Cybersecurity Regulation to these rapidly expanding technologies, it cautioned covered entities that cybersecurity risks associated with AI are โ€œconcerningโ€ and should be taken into account in risk assessments and addressed in cybersecurity programs.[4]

The Second Amended Cybersecurity Regulation signals a significant shift in the cybersecurity regulatory landscape, reflecting NYDFSโ€™s proactive efforts to empower covered entities to protect themselves against escalating threats of sophisticated and frequent cyber events.ย  Organizations should assess their cybersecurity policies and practices to ensure that adequate controls, resources, and personnel are in place to comply with NYDFSโ€™s regulatory changes.

__________

[1] NYDFS did not adopt its proposed requirement that external experts conduct risk assessments at least once every three years.

[2] Privileged account means โ€œany authorized user account or service account that can be used to perform security-relevant functions that ordinary users are not authorized to perform,ย  including but not limited to the ability to add, change or remove other accounts, or make configuration changes to information systems.โ€ย  Sectionย 500.1(n).

[3] Assessment of Public Comments on the Revised Proposed Second Amendment to 23 NYCRR Partย 500, here.

[4] Assessment of Public Comments on the Revised Proposed Second Amendment to 23 NYCRR Partย 500, here.


The following Gibson Dunn lawyers assisted in preparing this alert: Alexander Southwell, Stephenie Gosnell Handler, Vivek Mohan, Sara Weed, Cassarah Chu, Anne Lonowski, and Ruby Lang.

Gibson Dunn lawyers are available to assist in addressing any questions you may have about these developments. Please contact the Gibson Dunn lawyer with whom you usually work, the authors, or any member of the firmโ€™s Privacy, Cybersecurity & Data Innovation practice group:

United States
S. Ashlie Beringer โ€“ Co-Chair, Palo Alto (+1 650.849.5327, [emailย protected])
Jane C. Horvath โ€“ Co-Chair, Washington, D.C. (+1 202.955.8505, [emailย protected])
Alexander H. Southwell โ€“ Co-Chair, New York (+1 212.351.3981, [emailย protected])
Matthew Benjamin โ€“ New York (+1 212.351.4079, [emailย protected])
Ryan T. Bergsieker โ€“ Denver (+1 303.298.5774, [emailย protected])
David P. Burns โ€“ Washington, D.C. (+1 202.887.3786, [emailย protected])
Gustav W. Eyler โ€“ Washington, D.C. (+1 202.955.8610, [emailย protected])
Cassandra L. Gaedt-Sheckter โ€“ Palo Alto (+1 650.849.5203, [emailย protected])
Svetlana S. Gans โ€“ Washington, D.C. (+1 202.955.8657, [emailย protected])
Lauren R. Goldman โ€“ New York (+1 212.351.2375, [emailย protected])
Stephenie Gosnell Handler โ€“ Washington, D.C. (+1 202.955.8510, [emailย protected])
Nicola T. Hanna โ€“ Los Angeles (+1 213.229.7269, [emailย protected])
Howard S. Hogan โ€“ Washington, D.C. (+1 202.887.3640, [emailย protected])
Kristin A. Linsley โ€“ San Francisco (+1 415.393.8395, [emailย protected])
Vivek Mohan โ€“ Palo Alto (+1 650.849.5345, [emailย protected])
Karl G. Nelson โ€“ Dallas (+1 214.698.3203, [emailย protected])
Rosemarie T. Ring โ€“ San Francisco (+1 415.393.8247, [emailย protected])
Ashley Rogers โ€“ Dallas (+1 214.698.3316, [emailย protected])
Eric D. Vandevelde โ€“ Los Angeles (+1 213.229.7186, [emailย protected])
Benjamin B. Wagner โ€“ Palo Alto (+1 650.849.5395, [emailย protected])
Sara K. Weed โ€“ Washington, D.C. (+1 202.955.8507, [emailย protected])
Michael Li-Ming Wong โ€“ San Francisco/Palo Alto (+1 415.393.8333, [emailย protected])
Debra Wong Yang โ€“ Los Angeles (+1 213.229.7472, [emailย protected])

Europe
Ahmed Baladi โ€“ Co-Chair, Paris (+33 (0) 1 56 43 13 00, [emailย protected])
Kai Gesing โ€“ Munich (+49 89 189 33-180, [emailย protected])
Joel Harrison โ€“ London (+44 20 7071 4289, [emailย protected])
Vera Lukic โ€“ Paris (+33 (0) 1 56 43 13 00, [emailย protected])

Asia
Connell Oโ€™Neill โ€“ Hong Kong (+852 2214 3812, [emailย protected])
Jai S. Pathak โ€“ Singapore (+65 6507 3683, [emailย protected])

ยฉ 2023 Gibson, Dunn & Crutcher LLP.ย  All rights reserved.ย  For contact and other information, please visit us at www.gibsondunn.com.

Attorney Advertising: These materials were prepared for general informational purposes only based on information available at the time of publication and are not intended as, do not constitute, and should not be relied upon as, legal advice or a legal opinion on any specific facts or circumstances. Gibson Dunn (and its affiliates, attorneys, and employees) shall not have any liability in connection with any use of these materials.ย  The sharing of these materials does not establish an attorney-client relationship with the recipient and should not be relied upon as an alternative for advice from qualified counsel.ย  Please note that facts and circumstances may vary, and prior results do not guarantee a similar outcome.

Leave a Comment

Comments

No comments yet. Why donโ€™t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *