About Us | Contact Us
View Cart

Information Overload 2017

By Dan Hadaway | Wednesday, November 23, 2016 - Leave a Comment

2017 – Ten Guidance Releases and the Solution . . .


A sidebar from our 2017 M-7 Article!
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .


ServIcons_ITAudit_01

We felt our M-7 article should inventory the new guidance you’ll need to get your arms around in 2017.  However, when we did this, the one trend about information overload was overloaded with information!  Thus, this sidebar illustrates the compliance burden faced with in 2017.  Remember, these ten documents are simply what’s already out there.  We don’t know what’s coming in 2017.

  1. The Cybersecurity Assessment Tool – while this was released in 2015, “the time to pay the pauper” is coming due in 2017, especially if you’re an OCC regulated bank. An MRA for every case you’re not at baseline needs to be taken seriously.
  2. Management Booklet (part of IT Exam Handbook). Updated in 11/10/2015, this new guidance expands the previous tactics of Information Security into the more comprehensive strategy of IT Governance.
  3. Appendix J – Another 2015 guidance that is going to be supervised against rather closely. If you haven’t integrated the implications of this into your vendor management and business continuity programs, you should do so soon.
  4. CAT FAQ – October 2016 release . . . this is a handy frequently asked questions guidance about the Cybersecurity Assessment Tool. You can claim ignorance no more!
  5. Update to Information Security Booklet – On 09/09/16 the FFIEC updated the Information Security Booklet, seemingly abandoning all pretense that CAT statements were always in guidance. It clarifies things, and adds to your to-do list.
  6. Interbank Messaging – While not setting any new guidance itself, this June 2016 bulletin put everyone on notice that attacks against interbank networks and wholesale payment systems had been observed in the wild . . . and reminded banks that they should be using multiple layers of security, including addressing the risk of compromised credentials in their risk management process.
  7. Retail Payment Systems Booklet – This 147 page document was revised in April 2016 to include new guidance for electronic retail payment systems including remotely created checks, electronically created payment orders and automated clearing house transactions.
  8. Extortion Statement – The FFIEC issued this notice to financial institutions in November 2015, providing guidance on responding to cyber attacks involving extortion, such as ransomware, and how to avoid becoming a victim in the first place.
  9. Statement on Compromised Credentials – A warning to financial institutions that they should be reviewing their risk management practices and controls to prevent attacks using stolen account credentials.
  10. Statement on Malware – Coming at the same time as the statement on compromised credentials, this statement calls on institutions to review their risk mitigation plans in regards to malware.

The Solution?

Now, you may wonder, what is the solution to this problem?

“The bad news is time flies. The good news is you’re the pilot.”

― Michael Altshuler”

The only way we’re going to be able to handle these periodic gluts of new guidance, without investing in more people, is to manage our time better.  It’s time to invest in time management training.

Enough said.


Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

Dan’s New Leaf is a fun blog to inspire thought in the area of IT Governance.”

 


same_strip_012513


 

Latest News
    Employees working from home may find it more difficult to follow security policies… An article review. The surge in employees working from home during the pandemic created many headaches for IT departments around the world, many of whom had no telecommuting policies or procedures before the start… but what about the employees who had to […]
    A Webinar-Movie infotex presents the 2021 update of a previously released webinar presented by our Lead Non-Technical Auditor, Adam Reynolds. This movie-short is intended for those who are planning to participate in an infotex Incident Response Test. Not sure about the importance of an Incident Response Test? Check out onetest.infotex.com for more information! Please let […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS INFOTEX PROMOTES BRYAN BONNELL TO DIGITAL MEDIA MANAGER infotex, the Managed Security Service Provider, announced Bryan Bonnell’s promotion from Senior Data Security Analyst to Digital Media Manager.  “He will continue his normal DSA duties on a limited basis, because we want everybody to stay in touch with […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS RYAN HENSLER OF INFOTEX, EARNS CISSP CERTIFICATE Ryan Hensler, Senior NOC Associate of infotex, Inc., recently received the CISSP certification. “Ryan has proven himself to be a seasoned security professional both in his work for infotex and now through achieving this certification.” said Sean Waugh, Information Security Officer. […]
    Dubious app store subscriptions bring in hundreds of millions of dollars in revenue… An article review. When it comes to malicious applications you’re probably familiar with things like malware and ransomware, and you have ways to avoid them.  Modern desktop and smartphone operating systems have built-in malware detection tools, and some web browsers even automatically […]
    Another Manifesto A supply-chain manifesto by the author of Never Say Never: A Password Manifesto! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . [Sssshh.  Turn out the lights.  Let’s lower our inner voices, as I have something to propose that might be a bit […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  
    While malware and security exploits continue to make headlines, the majority of reported security incidents involve phishing… An article review. With all the attention given recently to security incidents involving software exploits and high-profile malware attacks, it would be easy to believe that they represented the most likely incidents you may encounter in the wild.  […]
    Implementing Protective DNS could help your organization avoid attack… An article review. Noting the risks still associated with the Domain Name System (DNS), the National Security Agency and the Cybersecurity and Infrastructure Security Agency (CISA) have recently released new guidance on the selection and use of a Protective DNS service (PDNS). The guidance, released in […]
    A Webinar-Movie In 2018 the NCUA started reviewing credit unions with $1 billion or more in assets using a tool known as the Automated Cybersecurity Examination Tool, or ACET. The expansion to smaller credit unions is inevitable. In the new year, credit unions should now think about how they can come into compliance with the […]