Skip to main content

Cybersecurity: Computer Security Basics

Updated this week

📘 Resource: Cybersecurity

Step Type: Text

What learners will learn: Cybersecurity overview.

Step Description:
Cybersecurity is essential for financial institutions because they handle sensitive financial data. As cyber threats become more common, these institutions must prioritize protecting their information.

Summary of Content:
This course introduces cybersecurity fundamentals and their importance in financial institutions. It covers the legal framework, historical context, and regulatory landscape shaping cybersecurity practices. Learners will explore best practices for implementing cybersecurity controls, challenges institutions face in managing risks, and real-world case studies that highlight the consequences of security failures. The content emphasizes the protection of sensitive financial data and compliance with evolving regulations.

Key Topics Covered:

  • Introduction to cybersecurity and its relevance to financial institutions

  • Key cybersecurity regulations: GLBA, FFIEC, SOX, PCI DSS, NYDFS, HIPAA, FTC Act

  • Historical development of cybersecurity laws and standards

  • Best practices for cybersecurity: policies, risk assessments, encryption, training, monitoring

  • Challenges in cybersecurity management: evolving threats, third-party risk, regulatory complexity

  • Real-world case studies: Equifax, Capital One, Target, Sony PSN


📘 Cybersecurity Overview

Step Type: True or False

What learners will learn: Cybersecurity essentials.

Step Description:
Explore a high-level introduction to cybersecurity, including its foundational concepts and the historical events that shaped its development.

Summary of Content:
This step covers the essential elements of cybersecurity, such as the goals of protecting systems, networks, and data. Learners will review real-world breaches and understand how legislation like SOX and NYDFS impacts institutional responsibilities. The content also dispels common misconceptions and provides accurate historical context for major regulations and data incidents.

Key Topics Covered:

  • Definition and scope of cybersecurity

  • The confidentiality, integrity, and availability (CIA) triad

  • Historical data breaches (Equifax, Capital One)

  • Key regulations (SOX, NYDFS)

  • Common cybersecurity myths and facts


📘 Key Cybersecurity Regulations

Step Type: MultiChoice

What learners will learn: Key cybersecurity regulations.

Step Description:
In the US, several key regulations and standards govern cybersecurity practices in financial institutions. Each regulation is crucial in guiding cybersecurity practices and ensuring that financial institutions effectively protect sensitive data.

Summary of Content:
This step introduces the primary regulatory frameworks that influence cybersecurity management in financial services. Learners will identify how specific acts and standards—such as GLBA, PCI DSS, SOX, and NYDFS—guide institutions in building secure systems. These laws enforce requirements for data protection, risk assessments, employee awareness, and third-party oversight.

Key Topics Covered:

  • GLBA Safeguards Rule requirements

  • PCI DSS standards for cardholder data protection

  • SOX internal controls for financial data security

  • HIPAA safeguards for health-related data

  • NYDFS mandates for cybersecurity programs

  • FFIEC tools for assessing cybersecurity preparedness

  • FTC Act enforcement and consumer protection


📘 The Evolution of Cybersecurity in Financial Institutions

Step Type: MultiChoice

What learners will learn: How cybersecurity has evolved for FIs.

Step Description:
Explore the historical milestones that shaped cybersecurity in the financial industry. From the Gramm-Leach-Bliley Act (1999) to the NYDFS Cybersecurity Regulation (2017), this step traces the development of key regulations and standards in response to technological advancements and major breaches like Equifax and Capital One. Gain a deeper understanding of how these events have influenced modern cybersecurity practices.

Summary of Content:
This step outlines the key moments and regulatory changes that drove the evolution of cybersecurity. Learners will examine the role of legislation, assessment tools, and real-world breaches in shaping today’s cybersecurity environment. The content highlights how institutions adapted to protect sensitive data amid increasing digital risks and regulatory scrutiny.

Key Topics Covered:

  • Gramm-Leach-Bliley Act (1999)

  • Sarbanes-Oxley Act (2002)

  • FFIEC Cybersecurity Assessment Tool (2015)

  • NYDFS Cybersecurity Regulation (2017)

  • Equifax and Capital One breaches

  • Impact of legislation on financial cybersecurity


📘 Implementing Cybersecurity Best Practices

Step Type: Streak

What learners will learn: Best practices for cybersecurity implementation.

Step Description:
Financial institutions should adopt best practices to enhance their security posture and protect sensitive data. By implementing the following best practices, they can effectively manage cybersecurity and comply with regulations.

Summary of Content:
This step outlines the specific practices financial institutions should follow to mitigate risk and meet regulatory standards. These include conducting risk assessments, maintaining access controls, encrypting data, training employees, and preparing for incident response. Consistent monitoring and updating ensure institutions stay protected in a rapidly evolving threat landscape.

Key Topics Covered:

  • Cybersecurity policies and procedures

  • Risk assessments and controls

  • Data encryption and secure configurations

  • Employee training and awareness

  • Incident response planning and execution

  • Continuous monitoring of systems and vendors


📘 Challenges in Cybersecurity Management

Step Type: Sorting

What learners will learn: Cybersecurity management challenges.

Step Description:
Managing cybersecurity presents several challenges for financial institutions, impacting their ability to effectively protect data and maintain compliance. Understanding these challenges helps institutions develop strategies to address them.

Summary of Content:
This step introduces the key operational and strategic challenges that institutions face in managing cybersecurity. Learners will explore how evolving threats, limited resources, third-party risks, and employee awareness can complicate cybersecurity programs. Addressing these areas is critical to building resilience and reducing vulnerability.

Key Topics Covered:

  • Evolving cyber threat landscape

  • Complex and overlapping regulatory requirements

  • Limited resources and staffing

  • Third-party and vendor-related risks

  • Data privacy and compliance concerns

  • Employee cybersecurity awareness


📘 Cybersecurity Case Studies

Step Type: Polygraph

What learners will learn: Cybersecurity case studies.

Step Description:
Examining real-world case studies helps illustrate the practical implications of cybersecurity measures and the importance of effective management. This step contains a few notable cases.

Summary of Content:
This step presents case studies of major cybersecurity breaches affecting financial institutions and large enterprises. Through incidents like Equifax, Capital One, Target, and Sony, learners gain insight into how security failures occur and what lessons were learned. The content reinforces the importance of regular updates, strong access controls, vendor oversight, and incident preparedness.

Key Topics Covered:

  • Equifax (2017): vulnerability management

  • Capital One (2019): third-party access control

  • Target (2013): vendor-related breach

  • Sony PSN (2011): need for robust incident response


📘 Mastery Test: Cybersecurity

Step Type: Crossword

What learners will learn: Cybersecurity review.

Step Description:
Let’s review what you’ve learned in this course!

Summary of Content:
This final step reinforces key cybersecurity concepts covered throughout the course. Learners will recall important definitions, best practices, regulatory requirements, and common challenges. The crossword format supports active recall and knowledge retention.

Key Topics Covered:

  • Cybersecurity definitions and terminology

  • Types of cyber threats

  • Regulatory safeguards and compliance measures

  • Encryption and access control

  • Incident response and monitoring

  • Data protection in financial institutions

Did this answer your question?