Cover & Rossiter to Join The Bonadio Group. Learn more.

One Year In: The 23 NYCRR Part 500 2nd Amendment

By Christopher Salone, CISA, CCSFP, on November 26th, 2024

The New York State Department of Financial Services (NYSDFS) Part 500 cybersecurity rule has been a groundbreaking regulation aimed at bolstering the cybersecurity posture of covered entities in New York State. Its significance cannot be overstated as it has set a precedent for other states and industries in terms of regulatory standards for cybersecurity. The second amendment to this rule introduced several key changes, enhancing the responsibilities and requirements for these entities. Let us review the progress and impact of these amendments one year after their implementation.

Key Dates and Milestones 

The second amendment introduced several important deadlines and milestones for covered entities to meet. So far, some new requirements that went into effect over the past year include:

  • December 1, 2023: Entities are required to notify the DFS of cybersecurity events reported to other authorities or events that have a reasonable likelihood of materially harming any part of normal operations. This includes ransomware deployments and any ransom payments made.
  • April 15, 2024: Entities must submit either a Certification of Material Compliance or an Acknowledgment of Noncompliance for the calendar year 2023, signed by the highest-ranking executive and the CISO.
  • April 29, 2024: Risk assessments and cybersecurity policies must be reviewed and updated annually. This includes the documentation of procedures addressing data retention, end-of-life management, remote access controls, and several other critical areas.
  • November 1, 2024: The CISO’s written report to senior governing bodies must include plans for remediating material inadequacies. Additionally, senior governing bodies must exercise oversight of cybersecurity risk management, including ensuring adequate resources are allocated for cybersecurity programs.
  • November 1, 2024: Covered entities must conduct annual penetration testing from inside and outside information system’ boundaries.

Implementation Challenges and Solutions 

The implementation of the amended cybersecurity rules has not been without its challenges. Covered entities faced several common hurdles, including:

  • Ensuring timely updates and reviews of risk assessments and cybersecurity policies.
  • Meeting the stringent notification requirements for cybersecurity events.
  • Allocating sufficient resources for cybersecurity training and awareness programs.
  • Communicating important cybersecurity related information to the Board without getting too far into the weeds.

To overcome these challenges, entities have adopted various strategies and best practices. For example, some have implemented comprehensive training programs to ensure all staff are aware of and comply with the new requirements, including the Board. Others have invested in advanced cybersecurity tools and technologies to enhance their risk management and incident response capabilities. Case studies have shown that those entities who have embraced a proactive approach to compliance have seen significant improvements in their cybersecurity posture.

Impact on Cybersecurity Posture 

One year after the second amendment, the impact on the cybersecurity posture of covered entities has been notable. There has been a marked improvement in cybersecurity awareness and training, particularly in areas such as social engineering. The requirement for annual penetration testing and vulnerability remediation has led to enhanced risk management practices. Additionally, the strengthened incident response and business continuity plans have ensured that entities are better prepared to handle cybersecurity-related disruptions.

Future Outlook 

Looking ahead, there are several upcoming deadlines and requirements that entities need to be aware of. By May 1, 2025, entities must conduct and implement processes for automated scans of information systems and manual reviews of systems not covered by such scans. Furthermore, by November 1, 2025, multi-factor authentication must be implemented for all individuals accessing information systems. In my experience, the requirement for rolling out the widespread use of MFA has been met with some initial pushback; however entities are finding that MFA tools are more accessible and feasible to implement in 2024 than they used to be when the regulation was originally adopted.

In terms of future amendments, it is expected that the regulatory landscape will continue to evolve, with potential new requirements being introduced to address emerging threats and vulnerabilities. For example, DFS has issued guidance within the past few months related to the risks of artificial intelligence. While this guidance does not change or add to the part 500 regulations, it would not surprise me if in subsequent iterations, new requirements are added. Entities must remain vigilant and proactive in their compliance efforts, continually updating and improving their cybersecurity programs.

If you need further guidance or have any questions on this topic, we are here to help. Please do not hesitate to reach out to discuss your specific situation.

This material has been prepared for general, informational purposes only and is not intended to provide, and should not be relied on for, tax, legal or accounting advice. Should you require any such advice, please contact us directly. The information contained herein does not create, and your review or use of the information does not constitute, an accountant-client relationship.

Share on LinkedIn
Share on Facebook
Share on X

Written By

Related Industries

Insights

Related Articles

Article
November 27, 2024
Mallory Conway July 24
Mallory Conway
Consulting – Executive Vice President
Jess LeDonne
Jess LeDonne
Director, Policy and Legislative Affairs