Products

Portable Devices Audit Checklist

Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices.  It includes an asset inventory as well as a checklist for sm...

Portable Devices Risk Assessment

The FFIEC is clear about the need to conduct risk assessments focused on the deployment of new technologies. This document is an asset-based drill-down risk assessment that can be used to establish inherent and residual risk on vulnerabilities to smartphones (iPhones, And...

Agenda for Configuration Standards Meeting

Agenda for Configuration Standards Meeting: This document is intended to help your technical team walk through the issues that must be understood before implementing BYOD and MDM (mobile device management) controls. It includes documentation such as how to tell if a devic...

Portable Devices Security Procedure (Mobile Devices Policy)

Portable Devices Security Procedure (Mobile Devices Policy):  This user-level document governs how users are to use, secure, maintain, and retire a portable device.  It covers both authorized (BYOD . . . employee-owned) devices as well as issued (company-owned) devices. T...

Vendor Management Program Kit

With all we’re doing to prevent technology incidents, what if your vendors have a breach? If your management team understands the risk exposure of vendors to your bank, you are definitely heading in the right direction.  If your “vendor owners” are condu...

IT Risk Management Program for Banks!

Examiners have made it clear:  if your management team understands the risk exposure of information and technology to your bank, you are definitely heading in the right direction.  If risk is considered in all technology decision making, an effective IT risk management pr...

Vendor Threshold Analysis

Vendor Risk Assessment Sort your vendors by Inherent Risk, then perform the due diligence. The level of scrutiny we apply to a vendor depends on the inherent risk exposure they raise.  Because of this, we need to have a method of quickly analyzing inherent risk, based o...