Canada: Cybersecurity 2.0: What's Expected Of Federally Regulated Financial Institutions

As federally regulated financial institutions (FRFIs) expand their reliance on technology, employ progressively complicated and interconnected networks and systems, increase their electronic service offerings and collaborate with technology service providers, cybersecurity has become a constant source of concern for FRFIs, as well as their regulators. To safeguard against the potentially far-reaching damage a breach of cybersecurity could inflict upon Canada's financial sector, the Office of the Superintendent of Financial Institutions (OSFI) has gradually incorporated cybersecurity into its ongoing supervision of risk, often by relying on FRFIs to take the initiative with limited regulator guidance.


In February 2012, OSFI released a memorandum (2012 Memorandum) reminding FRFIs that the expectations contained in OSFI Guideline B-10: Outsourcing of Business Activities, Functions and Processes (Guideline B-10) "remain current and continue to apply" in respect of technology-based outsourcing services such as cloud computing. The 2012 Memorandum also emphasizes the importance of FRFIs considering their ability to meet the expectations of Guideline B-10 in respect of material technology-based outsourcing arrangements, with an emphasis on: confidentiality, security and separation of property; contingency planning; location of records; access and audit rights; subcontracting; and monitoring.

Although the 2012 Memorandum does not use the phrase "cybersecurity", it confirms that any risks associated with outsourcing technology-based services are within the scope of OSFI's existing outsourcing risk management expectations. Rather than targeting particular technologies, developing specific technology guidance or mandating compliance with specific standards (which was not done in Guideline B-10 or the 2012 Memorandum), OSFI relies on the judgment of individual FRFIs to apply existing guidance and risk management principles to technology and cyber risks faced by the FRFI. While this approach allows OSFI to avoid propagating over (or under) inclusive standards that rapidly become obsolete as technology evolves, it can often leave FRFIs unclear as to OSFI's expectations.


Recognizing the growth in the frequency and sophistication of cyber-attacks and the elevated risk profile resulting from it, in May 2013, OSFI identified cybersecurity as a priority in its Plan and Priorities for 2013-2016, stating that over the next three years OSFI would increase its resources in the area of operational risk to enable it to conduct more reviews of FRFIs and specifically target "technology risk with a focus on cybersecurity; quality of data systems; and overall management of rising operational risk." OSFI also advised that it would raise the bar for operational risk units at FRFIs, expecting them to strengthen their best practices. Among other things, OSFI proposed to conduct a targeted cross-sector review of technology risk at major FRFIs with a view to identifying gaps so that practices could be enhanced.

Later that year, OSFI released the Cybersecurity Self-Assessment Guidance (Self-Assessment). By setting out "desirable properties and characteristics of cybersecurity practices", the Self-Assessment is designed to assist FRFIs in assessing their level of preparedness and developing and maintaining effective cybersecurity practices. The Self-Assessment template identifies six broad areas in respect of which FRFIs can rate their current level of maturity on a scale of one to four, with a rating of one signifying a practice that is not yet implemented and a rating of four signifying that the practice and related principles are fully implemented across the entire enterprise. In particular, FRFIs are asked to rate themselves in respect of the following:

  • Organization and Resources: The criteria relate to the FRFI's establishment of accountability and ownership of, and financial resources for: its cybersecurity framework, the FRFI's organizational structures and capabilities for managing cybersecurity, and cybersecurity employee training and awareness.
  • Cyber Risk and Control Assessment: The criteria relate to the FRFI's processes for assessing cyber risk across all business lines and geographies; the assessment and mitigation of cyber risk arising from material outsourcing arrangements and critical IT service providers; the consideration of cyber risk in change management processes and due diligence processes; security testing of IT assets, infrastructure and network systems; conduct of cyber-attack and recovery simulations; and impact assessment of extended, nationwide Internet outages.
  • Situational Awareness: The criteria relate to the FRFI having enterprise-wide knowledge of its users, devices, applications and their relationships; central storage of historical security event information; analysis of security event information; monitoring and tracking cybersecurity incidents in the industry and more broadly; and subscribing to industry research on cybersecurity.
  • Threat and Vulnerability Risk Management: The criteria relate to the FRFI's implementation of tools and controls for data loss detection/prevention and cyber incident detection and mitigation; the FRFI's implementation of security-related processes and controls for software, network infrastructure, configuration management, and network access and management; the FRFI's management of cybersecurity risk in material outsourcing arrangements and arrangements with critical IT service providers through due diligence; and provision of cybersecurity awareness and information to customers and clients and taking additional actions to protect customers and clients.
  • Cybersecurity Incident Management: The criteria relate to the FRFI's incident management framework and associated processes and procedures (including change management processes, incident escalation protocols and communications protocols) and their ability to support rapid response to cybersecurity incidents, as well as to support service recovery, systems integrity and loss or recovery of data and post-incident review of cybersecurity incidents.
  • Cybersecurity Governance: The criteria are divided into five subcategories. The first category relates to the FRFI's establishment of an enterprise-wide cybersecurity policy that is linked to other relevant risk management policies, as well as the establishment of a cybersecurity strategy (and implementation plan) that is aligned with the FRFI's business plan. The second category relates to the FRFI's risk management approach to cybersecurity risk. The third category relates to the FRFI's internal audit practices as they relate to cybersecurity. The fourth category relates to the participation and role of FRFI's senior management and board in addressing cyber risk and implementing the FRFI's cybersecurity framework. The fifth and final category relates to the FRFI conducting an external benchmarking review of its cybersecurity framework.

In line with its prior approach, OSFI stated that it did "not... plan to establish specific guidance for control and management of cyber risk", but would potentially request that FRFIs complete the otherwise voluntary Self-Assessment and "emphasize cybersecurity practices during future supervisory assessments." OSFI has not established additional specific guidance on the topic of cyber risk, nor has OSFI modified the initial Self-Assessment template since 2013.


Since 2013, OSFI has continued to identify cybersecurity as a key risk in its Reports on Plans and Priorities. In the reports published in 2014 and 2015, OSFI identified cybersecurity and outsourcing risk as operational risks, and in 2015 planned to pursue certain mitigation efforts to reduce risk exposure in respect of cybersecurity. OSFI stated that it intends to enhance supervisory processes through the following activities:

  • Monitoring federal cybersecurity legislation to ensure coordination with OSFI's activities in this area
  • Monitoring and following-up on FRFIs' responses to the Self-Assessment (i.e. adherence to their response plan)
  • Following-up on distributed denial-of-service preparedness, cybersecurity, IT governance and risk management reviews

OSFI also proposed to pursue any gaps identified in the course of monitoring compliance.


Earlier this year, OSFI released Draft Guideline E-21: Operational Risk Management (Draft Guideline) for comments. In its draft form, the Draft Guideline did not specifically identify cybersecurity or technology matters, but operational risk is defined broadly as "the risk of loss resulting from people, inadequate or failed internal processes and systems, or from external events", which can easily be applicable to cybersecurity and technology risks. As discussed in our August 2015 Blakes Bulletin: What Does Operational Risk Management Draft Guideline Mean for Federally Regulated Financial Institutions?, once the Draft Guidance is finalized, OSFI will expect all FRFIs (other than branch operations of foreign banks and foreign insurance companies) to establish and maintain an enterprise-wide framework of operational risk management controls, informed by four guiding principles. In particular:

  • Operational risk management should be fully integrated within the FRFI's overall risk management program and appropriately documented.
  • Operational risk management should serve to support the overall corporate governance structure of the FRFI. As part of this, FRFIs should develop and utilize an operational risk appetite statement as a component of the board-approved risk appetite framework described in OSFI's Corporate Governance Guideline. The operational risk statement should regularly be reviewed by the FRFI's board and senior management.
  • FRFIs should ensure effective accountability for operational risk management. A "three lines of defence" approach or appropriately robust structure serves to separate the key practices of operational risk management and provide adequate independent overview and challenge. How this is operationalized in practice in terms of the organizational structure of a FRFI will depend on its business model and risk profile.
  • FRFIs should ensure comprehensive identification and assessment of operational risk through the use of appropriate management tools. Maintaining a suite of operational risk management tools provides a mechanism for collecting and communicating relevant operational risk information within the FRFI and to relevant supervisory authorities.

Like the Self-Assessment, the principles-based nature of the Draft Guideline aims to promote standards without prescribing how they are to be achieved. In several respects, the Self-Assessment complements the Draft Guideline. The cybersecurity Governance criteria in the Self-Assessment align with the three lines of defence set out in the Draft Guideline. Both expect FRFIs to implement a system of escalating supervision over risk, including internal auditing and independent reviews on evaluating the respective risk management frameworks. To the extent the Self-Assessment offers more detail regarding the elements that comprise the different levels of defence, FRFIs can use their responses to the Self-Assessment to inform their operational risk management frameworks once the Draft Guideline is in final form. The comment period ended on October 9, 2015, and it remains to be seen whether OSFI will entertain significant changes to the Draft Guideline.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on

Click to Login as an existing user or Register so you can print this article.

Events from this Firm
27 Oct 2016, Seminar, Toronto, Canada

Please join members of the Blakes Commercial Real Estate group as they discuss five key provisions of a commercial real estate purchase agreement that are often the subject of much negotiation but are sometimes misunderstood.

1 Nov 2016, Seminar, Toronto, Canada

What is the emotional culture of your organization?

Every organization and workplace has an emotional culture that can have an impact on everything from employee performance to customer or client satisfaction.

3 Nov 2016, Seminar, Toronto, Canada

Join leading lawyers from the Blakes Pensions, Benefits & Executive Compensation group as they discuss recent updates and legal developments in pension and employee benefits law as well as strategies to identify and minimize common risks.

In association with
Related Video
Up-coming Events Search
Font Size:
Mondaq on Twitter
Register for Access and our Free Biweekly Alert for
This service is completely free. Access 250,000 archived articles from 100+ countries and get a personalised email twice a week covering developments (and yes, our lawyers like to think you’ve read our Disclaimer).
Email Address
Company Name
Confirm Password
Mondaq Topics -- Select your Interests
 Law Performance
 Law Practice
 Media & IT
 Real Estate
 Wealth Mgt
Asia Pacific
European Union
Latin America
Middle East
United States
Worldwide Updates
Check to state you have read and
agree to our Terms and Conditions

Terms & Conditions and Privacy Statement (the Website) is owned and managed by Mondaq Ltd and as a user you are granted a non-exclusive, revocable license to access the Website under its terms and conditions of use. Your use of the Website constitutes your agreement to the following terms and conditions of use. Mondaq Ltd may terminate your use of the Website if you are in breach of these terms and conditions or if Mondaq Ltd decides to terminate your license of use for whatever reason.

Use of

You may use the Website but are required to register as a user if you wish to read the full text of the content and articles available (the Content). You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these terms & conditions or with the prior written consent of Mondaq Ltd. You may not use electronic or other means to extract details or information about’s content, users or contributors in order to offer them any services or products which compete directly or indirectly with Mondaq Ltd’s services and products.


Mondaq Ltd and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published on this server for any purpose. All such documents and related graphics are provided "as is" without warranty of any kind. Mondaq Ltd and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Mondaq Ltd and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from this server.

The documents and related graphics published on this server could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Mondaq Ltd and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time.


Mondaq Ltd requires you to register and provide information that personally identifies you, including what sort of information you are interested in, for three primary purposes:

  • To allow you to personalize the Mondaq websites you are visiting.
  • To enable features such as password reminder, newsletter alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our information providers who provide information free for your use.

Mondaq (and its affiliate sites) do not sell or provide your details to third parties other than information providers. The reason we provide our information providers with this information is so that they can measure the response their articles are receiving and provide you with information about their products and services.

If you do not want us to provide your name and email address you may opt out by clicking here .

If you do not wish to receive any future announcements of products and services offered by Mondaq by clicking here .

Information Collection and Use

We require site users to register with Mondaq (and its affiliate sites) to view the free information on the site. We also collect information from our users at several different points on the websites: this is so that we can customise the sites according to individual usage, provide 'session-aware' functionality, and ensure that content is acquired and developed appropriately. This gives us an overall picture of our user profiles, which in turn shows to our Editorial Contributors the type of person they are reaching by posting articles on Mondaq (and its affiliate sites) – meaning more free content for registered users.

We are only able to provide the material on the Mondaq (and its affiliate sites) site free to site visitors because we can pass on information about the pages that users are viewing and the personal information users provide to us (e.g. email addresses) to reputable contributing firms such as law firms who author those pages. We do not sell or rent information to anyone else other than the authors of those pages, who may change from time to time. Should you wish us not to disclose your details to any of these parties, please tick the box above or tick the box marked "Opt out of Registration Information Disclosure" on the Your Profile page. We and our author organisations may only contact you via email or other means if you allow us to do so. Users can opt out of contact when they register on the site, or send an email to with “no disclosure” in the subject heading

Mondaq News Alerts

In order to receive Mondaq News Alerts, users have to complete a separate registration form. This is a personalised service where users choose regions and topics of interest and we send it only to those users who have requested it. Users can stop receiving these Alerts by going to the Mondaq News Alerts page and deselecting all interest areas. In the same way users can amend their personal preferences to add or remove subject areas.


A cookie is a small text file written to a user’s hard drive that contains an identifying user number. The cookies do not contain any personal information about users. We use the cookie so users do not have to log in every time they use the service and the cookie will automatically expire if you do not visit the Mondaq website (or its affiliate sites) for 12 months. We also use the cookie to personalise a user's experience of the site (for example to show information specific to a user's region). As the Mondaq sites are fully personalised and cookies are essential to its core technology the site will function unpredictably with browsers that do not support cookies - or where cookies are disabled (in these circumstances we advise you to attempt to locate the information you require elsewhere on the web). However if you are concerned about the presence of a Mondaq cookie on your machine you can also choose to expire the cookie immediately (remove it) by selecting the 'Log Off' menu option as the last thing you do when you use the site.

Some of our business partners may use cookies on our site (for example, advertisers). However, we have no access to or control over these cookies and we are not aware of any at present that do so.

Log Files

We use IP addresses to analyse trends, administer the site, track movement, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information.


This web site contains links to other sites. Please be aware that Mondaq (or its affiliate sites) are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of these third party sites. This privacy statement applies solely to information collected by this Web site.

Surveys & Contests

From time-to-time our site requests information from users via surveys or contests. Participation in these surveys or contests is completely voluntary and the user therefore has a choice whether or not to disclose any information requested. Information requested may include contact information (such as name and delivery address), and demographic information (such as postcode, age level). Contact information will be used to notify the winners and award prizes. Survey information will be used for purposes of monitoring or improving the functionality of the site.


If a user elects to use our referral service for informing a friend about our site, we ask them for the friend’s name and email address. Mondaq stores this information and may contact the friend to invite them to register with Mondaq, but they will not be contacted more than once. The friend may contact Mondaq to request the removal of this information from our database.


This website takes every reasonable precaution to protect our users’ information. When users submit sensitive information via the website, your information is protected using firewalls and other security technology. If you have any questions about the security at our website, you can send an email to

Correcting/Updating Personal Information

If a user’s personally identifiable information changes (such as postcode), or if a user no longer desires our service, we will endeavour to provide a way to correct, update or remove that user’s personal data provided to us. This can usually be done at the “Your Profile” page or by sending an email to

Notification of Changes

If we decide to change our Terms & Conditions or Privacy Policy, we will post those changes on our site so our users are always aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it. If at any point we decide to use personally identifiable information in a manner different from that stated at the time it was collected, we will notify users by way of an email. Users will have a choice as to whether or not we use their information in this different manner. We will use information in accordance with the privacy policy under which the information was collected.

How to contact Mondaq

You can contact us with comments or queries at

If for some reason you believe Mondaq Ltd. has not adhered to these principles, please notify us by e-mail at and we will use commercially reasonable efforts to determine and correct the problem promptly.