Back Office

Protected: Technical Audit Toolkit

Workshop Portal Upon completion of the Technical Audit Toolkit Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financial institution. By using any of the boilerplates, you signify agre...

Protected: Cybersecurity and Incident Response Workshop

Northeast Indiana Chapter Upon completion of the Incident Response Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financial institution. By using any of the boilerplates, you signify ...

Technology Planning for the Multidisciplinary Team

Another stop in the IT Governance Tour! Designed for IT Steering Committees! What should be considered in your annual update to your Technology Plan? What is the different between strategy and tactics? What is the “mission of Technology?” This free webinar ...

Do Your Due Diligence!

Executive Summary Exhibit 1:  Company Profile Company History Company Address Ownership Representatives Security Team Bios, Certifications Legal or Ethical Matters Exhibit 2:  Information Security Considerations Affidavit of Operations and Controls Certificate of Insur...

Sign Up for our Blog!

Get Information Security and IT Risk Management news right to your e-mail box! As part of infotex‘s service to our clients, find “non-mainstream” articles about relevant security issues, and some of us “blog” about IT Governance. This include...

Protected: Sharpen Your Vendor Management Tools

Vendor Management Workshop Portal Indiana Banker’s Association, July 16th, 2015 Upon completion of the Vendor Management Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financ...

Protected: FFIEC Education Requirements!

Upon completion of the IBA Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financial institution. By using any of the boilerplates, you signify agreement to the terms and conditions as...

lemons040215

Incident Response Documents Per the 07/29/15 Lemons Webinar Encore Presentation (the Director’s Cut)! Turning Lemons into Lemonade with Incident Response PDF of PowerPoint Policy Plan DDoS Scenario NIST CyberSecurity Framework An article about the two new FFIEC S...

Vendor Threshold Analysis

Vendor Risk Assessment Sort your vendors by Inherent Risk, then perform the due diligence. The level of scrutiny we apply to a vendor depends on the inherent risk exposure they raise.  Because of this, we need to have a method of quickly analyzing inherent risk, based o...

Becoming the Voice of America!

for readers of the Hoosier Banker Magazine . . . FREE Awareness Training Strategies! Awareness is often the only missing piece of the puzzle! To see how you can create a high-level strategy for awareness in general, and a detailed customer awareness strategy in particula...