Bank examiners and auditors constantly change their expectations. The result is you feel as if your information security practices are trying to hit a moving target while the boundaries shift constantly.
How you can deliver an all-star information security audit
FINOSEC posted in Cybersecurity, Guidance, checklist, board, board training, training, Exam, Exam Readiness, preparedness, Security, information security, Processess, independence, Information Security Officer
How do you manage access to all of your banking systems?
FINOSEC posted in Cybersecurity, Innovation, Banking, User Access, User Access Reporting, board, board training
User Access
There are likely a high number of systems in place at your institution. Running a successful financial institution relies heavily on tools and technologies that will improve the efficiencies of you and your team.
Does your institution still have outdated processes in place?
FINOSEC posted in Cybersecurity, Innovation, board training, Exam Readiness, preparedness, Security, information security, Information Security Officer
In a video released to FINOSEC Academy, Co-Founder and CEO, Zach Duke, poses some questions around the processes you currently have in place at your institution. Regardless of which department you think of first, it is likely that some outdated processes are still in place, and your information security and cyber security teams are no exception.
How to better manage your financial institution’s information security systems
FINOSEC posted in Cybersecurity, Innovation, Banking, system map, board, board training, information security, System Inventory
It’s vital for you to fully understand the information security management systems you have in place
But it’s a nuisance to keep track of them all. First, you need to know the status of every component, especially for the systems you outsourced. Then, you must also understand the different kinds of information the systems store, how it’s stored, how data is transmitted, and what kinds of information is transmitted.
What key processes in IT Controls does your institution have in place?
FINOSEC posted in Cybersecurity, Banking, board, board training, Risk Assessment, IT Controls, information security, IT, Processess
Managing Risk
Why Does Independence In Your Information Security Officer Matter?
FINOSEC posted in Cybersecurity, Innovation, Banking, board training, information security, independence, Information Security Officer
ISO Independence
A vital component of your information security program is an information security officer that is independent and adhering to appropriate segregation of duties as outlined by regulatory expectations.
Staffing Questions
FINOSEC posted in Cybersecurity, Banking, board, board training, training
In a technology driven industry, it is easy to assume that most of the decisions made around your cybersecurity posture are related to tools and software. While that may be the case a majority of the time, FINOSEC President and CEO Zach Duke also raises some questions and awareness around the impact of staffing on your cybersecurity and information security environment. In the video below, Zach poses questions around ISO independence, support infrastructure, and how to navigate staffing limitations. Watch the video and come back after the break for further discussion.
Credible Challenge
FINOSEC posted in Cybersecurity, Innovation, Banking, credible, board, board training, training
It is understood and expected that auditors and examiners will ask financial institutions about the safeguards, controls, and tools in place that drive and strengthen their cybersecurity governance. But as FINOSEC President and CEO Zach Duke describes in today’s video, they will also be looking for additional components. The industry is seeing expectations to describe the nuances of what questions and processes were present in cyber related strategic decisions, a concept called “credible challenge.” Auditors and examiners are looking for validation that the Board and other executive leadership members are asking solid questions and demonstrate compelling processes in making decisions around cybersecurity. Watch the video from Zach below and come back after the break for further discussion.