DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Industry Letter – June 23, 2025: Impact to Financial Sector of Ongoing Global Conflicts

Posted on June 24, 2025 by Dissent

From: New York State Department of Financial Services
To: All Individuals and Entities Regulated by the New York State Department of Financial Services
Re: Impact to Financial Sector of Ongoing Global Conflicts

The New York State Department of Financial Services (the “Department”) is issuing this guidance (“Guidance”) to all individuals and entities regulated by the Department (“regulated entities”) to reiterate the importance of adhering carefully to U.S. sanctions, as well as to New York State and Federal laws and regulations, including Department cybersecurity and virtual currency regulations set forth in 23 NYCRR Part 500 and 23 NYCRR Part 200, respectively. This Guidance highlights steps regulated entities should take to prepare for an increased threat of cybersecurity attacks, in light of ongoing global conflict. The Department understands that not every measure applies to every regulated entity, however in the interest of transparency and as a means of helping to focus regulated entities’ attention on certain key controls, the Department is sharing this vital information with all regulated entities.

The Department will provide further guidance to regulated entities as necessary.

CYBERSECURITY

Escalating global conflict significantly elevates cyber risk for the U.S. financial sector, including an increased risk of ransomware attacks and phishing campaigns.

Regulated entities should review their cybersecurity programs to ensure full compliance with the Department’s cybersecurity regulation (23 NYCRR Part 500). They are encouraged to pay particular attention to core cybersecurity hygiene measures like multi-factor authentication, privileged access management, vulnerability management, and disabling or securing remote desktop protocol access, each of which helps to prevent cybersecurity threats and mitigate the impact of a cyber event. In addition, regulated entities should:

  • Review their risk assessment(s) to account for recent changes in the cyber-risk landscape.
  • Monitor and regularly assess risks presented by third party service provider arrangements.
  • Review, update, and test their incident response and business continuity plans, and ensure that the plans affirmatively address destructive cyberattacks such as ransomware.
  • Re-evaluate plans to maintain essential services, protect critical data, and preserve customer confidence, considering the increased threat of extended outages and disruption.
  • Implement and continuously update risk-based controls designed to detect unauthorized or anomalous activity, such as Endpoint Detection and Response and Security Information and Event Management tools.
  • Conduct a full test of the ability to restore from backups.
  • Provide additional cybersecurity awareness training and reminders for all personnel.

Regulated entities should also closely track guidance and alerts from the Cybersecurity and Infrastructure Security Agency (“CISA”) and relevant Information Sharing and Analysis Centers (“ISACs”).

Regulated entities must report cybersecurity events that meet the criteria of 23 NYCRR § 500.17(a) as promptly as possible, and within 72 hours in any event, via the secure Department Portal, which can be accessed from the Cybersecurity Resource Center. Regulated entities should also immediately report cybersecurity events to law enforcement, such as to the FBI, including athttps://www.ic3.gov/, and to CISA at https://myservices.cisa.gov/irf or (844) Say-CISA (844-729-2472).

Read the rest of the letter at NYDFS.

Related posts:

  • HIPAA Security Rule Facility Access Controls – What are they and how do you implement them?
  • Protect Good Faith Security Research Globally in Proposed UN Cybercrime Treaty
  • APT Groups Target Healthcare and Essential Services
Category: Financial SectorLegislationOf NoteState/Local

Post navigation

← MNGI Digestive Health settles class action lawsuit stemming from BlackCat attack
Marquette County Medical Care Facility discloses data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.