About Us | Contact Us
View Cart

Why We Endorse TRAC!

By Dan Hadaway | Thursday, November 7, 2013 - Leave a Comment

“The days of Dan Hadaway’s spreadsheets are numbered.”

We were open to this reality very early on, because we had been asking ourselves many related questions for several years. Many of our Clients suggested we turn our spreadsheets into a database, but we knew we were weak in the “non-IT areas of Enterprise Risk Management (ERM).” We are not experts in BSA, Loan Risk, Market Risk, Business Continuity Planning, etc.

So the questions became, how do we approach ERM, given that we only know the IT side of risk assessing? How are we going to make sure our approach can plug into a bank’s overall enterprise risk management approach? How are we going to audit banks using ERM applications if we have no experience using them ourselves? Finally, how do we design audits using our Clients’ risk assessments, when they are no longer coming from spreadsheets?

So in November 2012, we began a search and selection process that took us through seven different ERM applications and ended up with our becoming a reseller of TRAC. Early on we investigated the independence issues surrounding our adopting an application and what we’ve determined is that, since we have to conduct a risk assessment as part of the audit, the only issue that will come out is that we will need to footnote our reports stating that we are resellers of TRAC, if our reports comment on the veracity of the Client’s risk management program (which they almost always will.)

In other words, we can remain independent as long our Clients (and report readers) are aware of the fact that we use TRAC. This is the same with our use of Nessus, MSBA, Nikto, MSAT, ophcrack, etc.

Meanwhile, we will be able to easily conduct a risk assessment for you, and show you how to integrate all of your risk measurement, response, and monitoring activities . . . . from business continuity to asset management to BSA to vendor management to drill-down product-based assessments. They’ve even got a customer risk assessment in this package. The benchmarking is by bank size, type of infrastructure, asset type, etc. Plus, they’ve got over 400 banks in their database (and growing!)

We’re very excited about the possibilities of helping our Clients streamline the entire IT Governance process. The fact that you’ll have one metrics system to apply to all of your risk assessments will make it easier for executives to see risk across the enterprise. Resource allocation will improve and be focused on the greatest risk mitigation. Compliance will be easier!

The seven alternatives were whittled down based on their ability to serve community based banks in Indiana and Ohio. We had some very unique requirements, including:

  1. Does the application address the minimum requirements of an Enterprise Risk Management Application?
  2. Does the application undergo a true, managed, system development life cycle that includes security testing?
  3. Does the provider already work with small, community-based banks?
  4. How large of a bank can this application scale to?
  5. Does the application exude an understanding of information security, it governance, and bank compliance best practices?
  6. Does the application facilitate an asset-based, multidisciplinary, metrics-oriented (with inherent and residual risk calculations) risk assessment process (or is it a glorified spreadsheet?)
  7. How well does the application facilitate vendor management, customer risk management, incident response, business impact analysis, and individual drill-down risk assessing on individual assets?
  8. How well does the application facilitate benchmarking with other similar-sized banks?
  9. Does the provider already have price points that are reasonable for a community-based bank?
  10. Does the application allow for modularity and updating?
  11. How customizable is the application?
  12. Does the application allow for benchmarking? Against community-based banks? By different categories? By asset?
  13. Will the provider allow Infotex to weigh in on the design changes and version priorities?
  14. Does the provider currently respond quickly to ideas and requests? Did (or will) the provider respond to an idea during the analysis portion of our process?
  15. Does the provider have a complete, sufficient due diligence packet?
  16. Does the provider demonstrate an understanding of win-win relationships?
  17. Is the provider willing to work with the Indiana Bankers Association and other associations, and provide marketing-free education?

The infotex staff is now working closely with the Secure Banking Systems staff to plan the rollout of this partnership. We will be training in December and January. If you are interested in learning more about enterprise risk management, we will be providing more information at our booth at the IT Security Conference, and have arranged for a series of webinars so you can learn more about Enterprise Risk Management in general, as well as the reasons we believe TRAC is a no-brainer for small community based banks to try!

For more information.

 


Latest News
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Questions about China’s new disclosure laws only highlight the uncertainty about disclosure in general… An article review. China recently made waves in the security world by announcing a new set of data security laws, one of which has added new fuel to a long running debate: how and when should security vulnerabilities be disclosed…and to […]
    Four Conditions … …For Why a Network Can be Anything But a Network! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I have to admit that infotex is being called into engineering meetings with larger organizations these days that are NOT community based banks.  We […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    If Zero days need Zero clicks, are there any secure devices in the mix? Tanvee Dhir explores the Pegasus spyware. Another technical post, meant to inspire thought about IT Governance . . . . Introduction Over the past couple of weeks, we have seen multiple stories regarding a powerful piece of spyware called Pegasus sold […]
    Our Lead Non-Technical Auditor takes a look at the new AIO Guidance… Architecture, Infrastructure, and Operations (AIO) is the latest booklet released by the Federal Financial Institutions Examination Council (FFIEC) in their line of  IT Examination Handbooks. It is an update to their 2004 Operations booklet and, as the name implies, expands into the areas […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Many organizations still fail to consider the unique risks posed by cloud computing… An article review. Last month thousands of Western Digital MyCloud device owners learned about the risks of cloud-based solutions the hard way: their data had been wiped remotely due to a flaw in the internet-facing component of their external hard drives. While […]
    infotex does not use Kaseya… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As you may be aware there was a large ransomware attack recently that leveraged a remote management tool called Kaseya that is used by many […]
    While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]