Tools

Enterprise Risk Management Committee Charter

Quick and Easy ERM Committee Boilerplate! This is a starting point for those wanting to establish an Enterprise Risk Management Committee. (It can also be used as the structure for an ISO Committee Charter, as well as a Audit Committee Charter.) The boilerplate charter is m...

Turn Lemons into Lemonade with Proactive Incident Responses!

A good incident response plan puts the finishing touch on an IT Governance Program. Let’s face it, there’s no such thing as 100% Security.   And any good risk assessment results in a certain level of accepted residual risk.  It is this residual risk that we resp...

Security Takes Cooperation

Security Takes Cooperation! To help you remind your employees that security requires cooperation, here’s a security awareness reminder poster that you may print and post in conspicuous locations:  security_takes_cooperation_082414 !  

Vendor Management 2014

Mark your calendars! Dan Hadaway will be delivering a workshop with the Indiana Bankers Association to outline what makes an effective vendor management program. The workshop will be on August 21st starting at 9:00 AM and ending at 4:00 PM. For information on how to register...

The Bitcoin Protocol Explained

What is the logic behind crypto-currencies like Bitcoin? You may have read articles around the web claiming to know the future of the controversial digital currency known as Bitcoin. Many of these articles fail to go far enough in depth to formulate any kind of legitimate o...

Vendor Risk, The TSP Booklet, and the ROE

When you perform due diligence on technology service providers, do you ask them if they are in the FFIEC Examination Program?  If not, you are missing an important third-party assurance opportunity.  How many times have you wondered whether the SSAE-16 SOC1/SOC2 reports are ...

Using SDelete

SDelete allows you to delete one or more files and/or directories, or to cleanse the free space on a logical disk. It is a command line utility that takes a number of options. SDelete accepts wild card characters as part of the directory or file specifier. Instructions on h...

Third Party Patch Management

Vulnerabilities come in all shapes and sizes and while operating system patch management has largely been simplified with tools like WSUS, there is still a high degree of risk due to many popular third party applications and the lack of any centralized patching mechanism for...

Three Teams and a SIEM Webinar Registration

Three Teams and a SIEM Webinar-Movie You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way th...

The Customer Awareness Control

Infotex has released a White Paper in response to the customer awareness training requirements of the June 28th Supplement to the 2005 Authentication Guidance released by the FFIEC.   The goal was to pull everything we know about customer awareness training into one place.  ...