Workshop Portal
Upon completion of the Technical Audit Toolkit Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financial institution. By using any of the boilerplates, you signify agre...
Northeast Indiana Chapter
Upon completion of the Incident Response Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financial institution. By using any of the boilerplates, you signify ...
Another stop in the IT Governance Tour!
Designed for IT Steering Committees!
What should be considered in your annual update to your Technology Plan?
What is the different between strategy and tactics?
What is the “mission of Technology?”
This free webinar ...
Executive Summary
Exhibit 1: Company Profile
Company History
Company Address
Ownership
Representatives
Security Team Bios, Certifications
Legal or Ethical Matters
Exhibit 2: Information Security Considerations
Affidavit of Operations and Controls
Certificate of Insur...
Get Information Security and IT Risk Management news right to your e-mail box!
As part of infotex‘s service to our clients, find “non-mainstream” articles about relevant security issues, and some of us “blog” about IT Governance. This include...
Vendor Management Workshop Portal
Indiana Banker’s Association, July 16th, 2015
Upon completion of the Vendor Management Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financ...
Upon completion of the IBA Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financial institution. By using any of the boilerplates, you signify agreement to the terms and conditions as...
Incident Response Documents
Per the 07/29/15 Lemons Webinar Encore Presentation (the Director’s Cut)!
Turning Lemons into Lemonade with Incident Response
PDF of PowerPoint
Policy
Plan
DDoS Scenario
NIST CyberSecurity Framework
An article about the two new FFIEC S...
Vendor Risk Assessment
Sort your vendors by Inherent Risk, then perform the due diligence.
The level of scrutiny we apply to a vendor depends on the inherent risk exposure they raise. Because of this, we need to have a method of quickly analyzing inherent risk, based o...
for readers of the Hoosier Banker Magazine . . .
FREE Awareness Training Strategies!
Awareness is often the only missing piece of the puzzle!
To see how you can create a high-level strategy for awareness in general, and a detailed customer awareness strategy in particula...