About Us | Contact Us
View Cart

The Magnificent Seven 2022

By Dan Hadaway | Monday, January 24, 2022 - Leave a Comment

Seven Trends . . .

that small bank Information Security Officers face in 2022
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .

Welcome to the Magnificent Seven, my annual predictive article about the seven trends in technology that will impact the Information Security Officers of small banks (under five billion in assets).  My intent: help you organize your thoughts for the upcoming year.

So, what issues do we think Information Security Officers will tackle in 2022?

Normally we present our top seven trends in reverse order, in the spirit of a typical “David Letterman Top 10 List,” where we save the best for last, but including responding to risk, we feel the number one trend often has such a wide-reaching impact that it impacts the other six trends. So . . . no David Letterman Style list this time. Instead, let’s just jump to the number one trend of 2022.

And no, the number one trend is not the ongoing pandemic, though it was started and accelerated during the recovery. Instead, the number one trend is what I’m calling The Disappearance. The Disappearance is simply a reverse-way of saying, “the virtualization of everything.”

Everything physical is disappearing. Servers . . . disappeared. Phone systems. Gone. Conferences and workshops – virtual. Cameras . . . replaced by the webcams in our endpoints. I mean, when is the last time you saw your auditor in person?  Your examiner?

Even our meetings are disappearing.

This started a decade ago, when our servers continued their increase in numbers, but not in physical rack-space, as virtualization became the norm. What started as virtual machines is now virtual meetings, virtual training, virtual phone systems, and even virtual security systems. Taking this further: cloud computing is now in the late majority phase of adoption, and we’re even putting our networks in the cloud with Azure, AWS, etc.

The second trend is actually a superset of the first: the pent-up adoption of new technologies. The momentum of new technology adoption that we spoke of in recent years will continue to make this trend more and more pertinent, and we believe 2022 will see the continuing adoption of many new technologies including the virtualization of everything. As the “late majority” of many technologies was supposed to start over a year ago, we see small banks planning everything from finally pulling the trigger on new mobile banking products to identity access management to expanding and upgrading their security capabilities. Meanwhile, the paradigm shift created by the pandemic . . . with implications ranging from the final mobilization of endpoints to working from home . . . The Disappearance . . . is causing us to adopt new controls ranging from Network Access Control or Conditional Access on our perimeters to endpoint security on our laptops. Meanwhile, new technologies leveraging big data, machine learning, neural networks and even the seeds of artificial intelligence tactics are still in the mix. And with an eye on the risk of this, many of us are planning to adopt new technologies as we “look forward to the recovery.” This leads to the third and fourth trends: MFA Everywhere, and Endpoint and Cloud Security. And these two self-explanatory trends will help us when we embark on the fifth trend.

All this adoption of new technologies right during The Disappearance is requiring us to “try a different perspective” on technology risk management. While we were already growing concerned that the FFIEC’s Cybersecurity Assessment Tool was antiquated, management is growing increasingly apt to “micro-manage” response to the ransomware threat, out of legitimate concern. Though the FFIEC’s release of the Architecture, Infrastructure, and Operations Guidance has been a step in the right direction and may end up changing how we do Technology Planning, it is always a good idea to look for other organizations maintaining well-refreshed bodies of knowledge. Thus, when we saw the Conference of State Bank Supervisors release the Ransomware Self-Assessment Tool (RSAT), we started suggesting that even non-state bank ISOs consider answering the 16 questions in an exercise with their management teams. But beyond that, we are starting to see banks look at adopting the NIST Cybersecurity Standard, the CIS Top 20 Controls, or even Cybersecurity Profile published by the ABA endorsed Cyber Risk Institute. Each of these frameworks are updated far more regularly than the FFIEC guidance has been. The CIS Top 20 has been updated at least seven times since 2014, if I counted right.

All three of these frameworks lead a community-based bank, by the way, to adopt MFA on Everywhere and Endpoint and Cloud Security as basic controls. Beware: and maybe by way of disclosure, but each of these frameworks will also lead you to relying more heavily on the production of a good SIEM. While this is self-serving, we maintain the need to try a different perspective can be exuded by the sixth trend.

The sixth trend gives us pause. In the era of major breaches and ransomware attacks, we have come to the conclusion that in order to make our networks, and by extension our customer’s data, safer, we should start doing the sorts of things that we do when we suspect a breach. Acting like we’ve already been breached is a mindset that can help us think of the things that we may otherwise not in times of relative security. Things like Zero Trust, Network Segmentation, strengthened Admin account security, and heightened and more intense awareness. Doing all the due diligence on forensics firms and establishing a relationship with a good one is important, as well as interfacing with any MSSP or MSOCs you may have. If you have someone watching your network, isn’t it a good idea to ensure the lines of communication are open and well used?

Speaking of heightened and intense awareness, that brings us to our seventh and final trend. We should apply awareness in all directions! What does that mean exactly? Instead of doing awareness training once a year, we should take a “drip” approach to the process. Making sure that EVERYONE in the institution is made aware of awareness training topics is important, but beyond that you also need to give everyone this information regularly, teach them that information, and then test them on that information. It’s like making a dough. The water (awareness) is dripped into the flour (the bank) and the continuous kneading (testing) is what will make it dough and hold together when we introduce it against an outside force, like a fan (Technology Risk). The testing could be ongoing and mixed social engineering, continuous penetration testing, and testing controls that we may feel are basic and easy. We also believe that Incident Response Testing is what we like to call the One Test and is extremely important.

In 2022, the Magnificent Seven is a Sentence:
So, to summarize, the top seven trends for 2022, according to Dan:

1) The Disappearance,
2) plus the Pent-up Adoption of New Technologies,
3) causes us to apply MFA Everywhere
4) and revisit Endpoint and Cloud Security,
5) as we try a different perspective . . .
6) like acting like we’ve already been breached
7) causing us to apply awareness in all directions!

If you are interested in more in depth descriptions of the Magnificent Seven? Check out the webinar-movie below!

Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

“Dan’s New Leaf” is a “fun blog to inspire thought in the area of IT Governance.”



Latest News
    What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evolving, we thought it was worth taking another […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! In the spirit of October and Halloween we have put together a gallery of our “spooky” Awareness Posters at halloween.infotex.com. Use them to help decorate for the holiday! Check […]
    With nearly three in four people using third-party payment services tied to their bank accounts, the risk isn’t limited to your own policies and procedures… An article review. When working on cybersecurity awareness messages for your customers you may be inclined to focus on your own systems, but a new study on security in digital […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX infotex is excited to announce that Cody Smith has joined the team as the newest Data Security Analyst. Cody holds several industry certifications (including the most recent: SSCP) as well as a B.S in Cyber Security & Information Assurance from Western Governors University. […]
    It’s all about protecting Customer information . . . In 1999 the Gramm-Leach-Bliley Act (GLBA) directed the Federal Deposit Insurance Corporation (FDIC) and other federal banking agencies to ensure that financial institutions have policies, procedures, and controls in place to prevent the unauthorized disclosure of customer financial information.  The FDIC and other federal banking agencies […]
    A Ghoulish Gallery! Just a few scary-themed Awareness posters from our collection, which you can see at posters.infotex.com! Below you will find both the vertical and horizontal versions of each of the posters, all you need to do is “right-click > “Save link as…” to download! Vertical 8.5″ x 11″ Format   Horizontal 11″ x […]
    What to Expect in an Annual Information Security Report to the Board Webinar-Movie Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from management about the information security risks and incidents, and the actions taken to address […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    With the potential to break all existing forms of encryption, quantum computing poses a unique challenge… An article review. While quantum computing has been a buzzword for some time now the technology remains largely theoretical, with small scale proofs-of-concept that still suffer from serious limitations.  That hasn’t stopped security researchers from worrying about the technology’s […]
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]