SB784,8,2323
(b) Implement the following security measures, as appropriate:
SB784,8,2424
1. Place access controls on information systems.
SB784,9,4
12. Identify and manage the data, personnel, devices, systems, and facilities
2that enable the licensee to achieve its business purposes, taking into consideration
3the relative importance of the data, personnel, devices, systems, and facilities to the
4business objectives and risk strategy of the licensee.
SB784,9,65
3. Restrict physical access to nonpublic information to authorized individuals
6only.
SB784,9,97
4. Protect, by encryption or other means, nonpublic information being
8transmitted over an external network and nonpublic information stored on a
9portable computer or storage device or media.
SB784,9,1110
5. Adopt secure development practices for applications that are developed
11in-house and utilized by the licensee.
SB784,9,1312
6. Modify information systems in accordance with the licensee's information
13security program.
SB784,9,1514
7. Utilize effective controls, which may include multifactor authentication
15procedures for employees accessing nonpublic information.
SB784,9,1716
8. Implement regular testing and monitoring of systems and procedures to
17detect actual and attempted attacks on, or intrusions into, an information system.
SB784,9,2118
9. Include audit trails within the information security program that are
19designed to detect and respond to cybersecurity events and to reconstruct material
20financial transactions sufficient to support the normal operations and obligations of
21the licensee.
SB784,9,2422
10. Implement measures to protect against the destruction, loss, or damage of
23nonpublic information due to environmental hazards, natural and other disasters,
24and technological failures.
SB784,10,2
111. Develop, implement, and maintain practices for the secure disposal of
2nonpublic information in all formats.
SB784,10,43
(c) Designate at least one employee, affiliate, or outside vendor as responsible
4for the information security program.
SB784,10,65
(d) Stay informed regarding emerging threats and vulnerabilities and
6implement safeguards to manage the threats and vulnerabilities.
SB784,10,87
(e) No less than annually, assess the effectiveness of security safeguards,
8including key controls, systems, and procedures.
SB784,10,109
(f) Include cybersecurity risks in the licensee's enterprise risk management
10process.
SB784,10,1211
(g) Utilize reasonable security measures when sharing information, taking
12into consideration the character of the sharing and the type of information shared.
SB784,10,1413
(h) Provide personnel with cybersecurity awareness training that is updated
14as necessary.
SB784,10,24
15(4) Program adjustments. The licensee shall monitor, evaluate, and adjust the
16information security program under sub. (1) consistent with changes in technology,
17the sensitivity of the nonpublic information, internal and external threats to
18nonpublic information, and changes to the licensee's business operations,
19outsourcing arrangements, and information systems. If a licensee identifies areas,
20systems, or processes that require material improvement, updating, or redesign, the
21insurer shall document the identification and remedial efforts to address the areas,
22systems, or processes. The licensee shall maintain the documentation for a period
23of at least 5 years starting from the date the documentation was created and shall
24produce the documentation upon demand of the commissioner.
SB784,11,6
1(5) Incident response plan. As part of its information security program, a
2licensee shall develop an incident response plan to promptly respond to, and recover
3from, a cybersecurity event that compromises the confidentiality, integrity, or
4availability of nonpublic information, the licensee's information systems, or the
5continuing functionality of any aspect of the licensee's business or operations. The
6incident response plan shall be in writing and address all of the following:
SB784,11,77
(a) The goals of the incident response plan.
SB784,11,88
(b) The internal process for responding to a cybersecurity event.
SB784,11,109
(c) The identification of clear roles, responsibilities, and levels of
10decision-making authority during and immediately following a cybersecurity event.
SB784,11,1211
(d) The external and internal communications and information sharing during
12and immediately following a cybersecurity event.
SB784,11,1413
(e) Requirements for the remediation of identified weaknesses in the
14information systems and associated controls.
SB784,11,1615
(f) The reporting and documentation of a cybersecurity event and related
16incident response activities.
SB784,11,1817
(g) The evaluation and revision of the incident response plan following a
18cybersecurity event.
SB784,11,23
19(6) Oversight of 3rd-party service provider arrangements. No later than 2
20years after the effective date of this subsection .... [LRB inserts date], a licensee shall
21exercise due diligence in selecting a 3rd-party service provider. The licensee shall
22make reasonable efforts to require a 3rd-party service provider to do all of the
23following:
SB784,12,3
1(a) Implement appropriate administrative, technical, and physical measures
2to protect and secure the information systems and nonpublic information that are
3accessible to or held by the 3rd-party service provider.