A vital component of your information security program is an information security officer that is independent and adhering to appropriate segregation of duties as outlined by regulatory expectations.
And let’s acknowledge the tests associated with bank examiners definitely fall into the “not fun” category.
Have you addressed the Computer-Security Incident Notification Requirements for Banking Organizations? Full compliance has been extended to May 1, 2022. Five questions to ask:
In a technology driven industry, it is easy to assume that most of the decisions made around your cybersecurity posture are related to tools and software. While that may be the case a majority of the time, FINOSEC President and CEO Zach Duke also raises some questions and awareness around the impact of staffing on your cybersecurity and information security environment. In the video below, Zach poses questions around ISO independence, support infrastructure, and how to navigate staffing limitations. Watch the video and come back after the break for further discussion.
It is understood and expected that auditors and examiners will ask financial institutions about the safeguards, controls, and tools in place that drive and strengthen their cybersecurity governance. But as FINOSEC President and CEO Zach Duke describes in today’s video, they will also be looking for additional components. The industry is seeing expectations to describe the nuances of what questions and processes were present in cyber related strategic decisions, a concept called “credible challenge.” Auditors and examiners are looking for validation that the Board and other executive leadership members are asking solid questions and demonstrate compelling processes in making decisions around cybersecurity. Watch the video from Zach below and come back after the break for further discussion.
The practice of user access reporting within financial institutions has historically been an arduous process that relies on archaic technology and is both time and labor intensive. While generating multiple user access reports per year would be ideal, many financial institutions, through no fault of their own, often find they can only produce the bare minimum amount of reporting required annually. But as cyber risks continue to grow and the regulatory requirements continue to increase, it is vital that financial institutions can quickly and easily produce these reports, and with increased frequency.
The landscape of cyber risk, and the equal and opposite best practices, is an ever evolving, ever growing, moving target. Staying abreast of the latest recommendations and regulatory expectations can be a daunting task, but it isn’t one that has to be faced alone. Partnerships between community banks and the right FinTech can make all the difference. Zach Duke, CEO and Founder of FINOSEC, sits down with the FinTech Cowboys at FedFis to discuss the nuances of the industry and share their mutual belief that these partnerships help ensure everyone can win. Built on the idea that everyone deserves simple cybersecurity governance, Zach shares how FINOSEC comes alongside community bankers to meet those challenges head on. Furthermore, they discuss how, in a technology saturated environment, trust and integrity are still the heart of these successes. Watch the video below and check out the notes after the break.
Contracts are typically dense, highly detailed documents that can be hard to navigate. After wading through strikingly specific legal verbiage, it can be difficult to ascertain whether or not the contracts are accomplishing everything they claim to be. As a result, financial institutions may wonder how they can feel confident in signing such a document. Systematically and thoroughly reading and reviewing the contract before agreeing to its terms are vital, but knowing how to do that well can be tough. Prior to conducting a review, you’ll need to understand the expectations of the relationship: which products/services were selected, any prerequisites or additional costs to implement, term(s) of the agreement, and the stakeholders. Conducting a contract review is vital to reduce overall risk, ensure that the provisions are correct, and provide both sides with the opportunity to fully understand what they are agreeing to before the final signing decision is made. Regulatory requirements mandate that each institution is responsible for reviewing and understanding vendor contracts and/or agreements - but that is easier said than done.
Threats to your cybersecurity and information security programs are not just external. In fact, 60% of security breaches are internal threats. The weakest component in your cybersecurity posture will always inherently be the human link.