Archive for 'Program Kits' Category
Social Media Guidance Kit
By Dan Hadaway - Last updated: Tuesday, February 19, 2013
Coming Soon! Sorry, we’re still reviewing the kit. The guidance has a lot of detail, and we’re wanting to be sure we get it right. Social Media Guidance Kit Current estimated release date: 03/21/14 with the Indiana Banker’s Association Workshop. If you’d like to be informed when we have finished development, feel free to email […]
SSAE-16 Review Checklist
By Vigilize - Last updated: Tuesday, January 22, 2013
Quick and Easy Due Diligence Checklist! Our most popular tool! What should you look for when you review a SOC2 report? What if you get a SOC1 or SOC3 instead? What type of paper trail should you leave, demonstrating an adequate review? How do you track that all appropriate stakeholders have processed their part of […]
Access Management Program Kit
By Dan Hadaway - Last updated: Sunday, March 11, 2012
Information security begins and ends with access management. The FFIEC guidelines require the establish of accountability and responsibility via data ownership. Establishing procedures, standards, checklists, and policies surrounding the management of access is paramount to any good IT Governance Program. Developing a solid access management program is the key to truly securing information in […]
By Dan Hadaway - Last updated: Saturday, March 10, 2012
Given there is no such thing as 100% security, and given that small banks are a high-value target for organized threats, we must recognize the inevitability of an incident. Out of crisis, opportunity! A solid, organized, level-headed response to an incident has to be a business process which receives high priority in these times of […]
Coming Soon! Sorry, we’re still reviewing the kit. The guidance has a lot of detail, and we’re wanting to be sure we get it right. Social Media Guidance Kit Current estimated release date: 03/21/14 with the Indiana Banker’s Association Workshop. If you’d like to be informed when we have finished development, feel free to email […]
Quick and Easy Due Diligence Checklist! Our most popular tool! What should you look for when you review a SOC2 report? What if you get a SOC1 or SOC3 instead? What type of paper trail should you leave, demonstrating an adequate review? How do you track that all appropriate stakeholders have processed their part of […]
Access Management Program Kit
By Dan Hadaway - Last updated: Sunday, March 11, 2012
Information security begins and ends with access management. The FFIEC guidelines require the establish of accountability and responsibility via data ownership. Establishing procedures, standards, checklists, and policies surrounding the management of access is paramount to any good IT Governance Program. Developing a solid access management program is the key to truly securing information in […]
By Dan Hadaway - Last updated: Saturday, March 10, 2012
Given there is no such thing as 100% security, and given that small banks are a high-value target for organized threats, we must recognize the inevitability of an incident. Out of crisis, opportunity! A solid, organized, level-headed response to an incident has to be a business process which receives high priority in these times of […]
Information security begins and ends with access management. The FFIEC guidelines require the establish of accountability and responsibility via data ownership. Establishing procedures, standards, checklists, and policies surrounding the management of access is paramount to any good IT Governance Program. Developing a solid access management program is the key to truly securing information in […]
Given there is no such thing as 100% security, and given that small banks are a high-value target for organized threats, we must recognize the inevitability of an incident. Out of crisis, opportunity! A solid, organized, level-headed response to an incident has to be a business process which receives high priority in these times of […]