Tools

2020 IBA Cybersecurity Conference Insurance Review Checklist

Welcome 2020 IBA Cybercon Attendees! You can download a zip folder that includes our Simplified Insurance Review Boilerplate! Download Here Also, if you are interested in Insurance Review check out our video! [su_youtube url=”https://youtu.be/G2ElG1Jp6v8″ wid...

Succession Planning Governance

What the FFIEC has to say about succession planning for members of the IT Governance process… We have been hearing about examination findings requiring Clients to create a succession plan for key members of the IT Governance process.  Dan asked me to update our re...

Cyber Challenge: A Community Bank Cyber Exercise

The FDIC has released new training material to help small banks start a discussion on risk… An article review. Sometimes it can be difficult to find a starting point when getting your employees discussing risk and technology, and while we do provide our own resou...

Object Access Limitations

Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are...

The Difference Between Patch and Vulnerability Management

by Eric Kroeger and Jason Mikolanis We are pleased to kick off our “guest author program” and are very excited and honored to present Eric Kroeger and Jason Mikolanis as our first guest authors.  Thank you Eric and Jason!! A deeper dive . . . This is the te...

Small Business Resource Page

Small Business Technology Risk Management Starting Points Remember, these are merely generic starting points! They may not be all-inclusive for your unique business! The infotex Small Business Technology Risk Assessment A starting point to determine tactics. For a movie...

Consumer Breach Resources

As of April 2015 Websites to visit if you fear you’ve been breached! Federal Trade Commission From there are links to credit bureaus, reporting sites, and fraud alert sites. Internet Crime Compliant Center (IC3) Starting point for investigating scams, frauds...

Enterprise Risk Management Committee Charter

Quick and Easy ERM Committee Boilerplate! This is a starting point for those wanting to establish an Enterprise Risk Management Committee. (It can also be used as the structure for an ISO Committee Charter, as well as a Audit Committee Charter.) The boilerplate charter i...

Security Takes Cooperation

Security Takes Cooperation! To help you remind your employees that security requires cooperation, here’s a security awareness reminder poster that you may print and post in conspicuous locations:  security_takes_cooperation_082414 !