About Us | Contact Us
View Cart

Why We Endorse TRAC!

By Dan Hadaway | Thursday, November 7, 2013 - Leave a Comment

“The days of Dan Hadaway’s spreadsheets are numbered.”

We were open to this reality very early on, because we had been asking ourselves many related questions for several years. Many of our Clients suggested we turn our spreadsheets into a database, but we knew we were weak in the “non-IT areas of Enterprise Risk Management (ERM).” We are not experts in BSA, Loan Risk, Market Risk, Business Continuity Planning, etc.

So the questions became, how do we approach ERM, given that we only know the IT side of risk assessing? How are we going to make sure our approach can plug into a bank’s overall enterprise risk management approach? How are we going to audit banks using ERM applications if we have no experience using them ourselves? Finally, how do we design audits using our Clients’ risk assessments, when they are no longer coming from spreadsheets?

So in November 2012, we began a search and selection process that took us through seven different ERM applications and ended up with our becoming a reseller of TRAC. Early on we investigated the independence issues surrounding our adopting an application and what we’ve determined is that, since we have to conduct a risk assessment as part of the audit, the only issue that will come out is that we will need to footnote our reports stating that we are resellers of TRAC, if our reports comment on the veracity of the Client’s risk management program (which they almost always will.)

In other words, we can remain independent as long our Clients (and report readers) are aware of the fact that we use TRAC. This is the same with our use of Nessus, MSBA, Nikto, MSAT, ophcrack, etc.

Meanwhile, we will be able to easily conduct a risk assessment for you, and show you how to integrate all of your risk measurement, response, and monitoring activities . . . . from business continuity to asset management to BSA to vendor management to drill-down product-based assessments. They’ve even got a customer risk assessment in this package. The benchmarking is by bank size, type of infrastructure, asset type, etc. Plus, they’ve got over 400 banks in their database (and growing!)

We’re very excited about the possibilities of helping our Clients streamline the entire IT Governance process. The fact that you’ll have one metrics system to apply to all of your risk assessments will make it easier for executives to see risk across the enterprise. Resource allocation will improve and be focused on the greatest risk mitigation. Compliance will be easier!

The seven alternatives were whittled down based on their ability to serve community based banks in Indiana and Ohio. We had some very unique requirements, including:

  1. Does the application address the minimum requirements of an Enterprise Risk Management Application?
  2. Does the application undergo a true, managed, system development life cycle that includes security testing?
  3. Does the provider already work with small, community-based banks?
  4. How large of a bank can this application scale to?
  5. Does the application exude an understanding of information security, it governance, and bank compliance best practices?
  6. Does the application facilitate an asset-based, multidisciplinary, metrics-oriented (with inherent and residual risk calculations) risk assessment process (or is it a glorified spreadsheet?)
  7. How well does the application facilitate vendor management, customer risk management, incident response, business impact analysis, and individual drill-down risk assessing on individual assets?
  8. How well does the application facilitate benchmarking with other similar-sized banks?
  9. Does the provider already have price points that are reasonable for a community-based bank?
  10. Does the application allow for modularity and updating?
  11. How customizable is the application?
  12. Does the application allow for benchmarking? Against community-based banks? By different categories? By asset?
  13. Will the provider allow Infotex to weigh in on the design changes and version priorities?
  14. Does the provider currently respond quickly to ideas and requests? Did (or will) the provider respond to an idea during the analysis portion of our process?
  15. Does the provider have a complete, sufficient due diligence packet?
  16. Does the provider demonstrate an understanding of win-win relationships?
  17. Is the provider willing to work with the Indiana Bankers Association and other associations, and provide marketing-free education?

The infotex staff is now working closely with the Secure Banking Systems staff to plan the rollout of this partnership. We will be training in December and January. If you are interested in learning more about enterprise risk management, we will be providing more information at our booth at the IT Security Conference, and have arranged for a series of webinars so you can learn more about Enterprise Risk Management in general, as well as the reasons we believe TRAC is a no-brainer for small community based banks to try!

For more information.

 


Latest News
    A Webinar Movie This presentation is intended for those who are planning to participate in an infotex incident response test. Please let us know what questions you have, when we have our Plan Walkthrough and Test Plan Approval meeting!
    What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evolving, we thought it was worth taking another […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! In the spirit of October and Halloween we have put together a gallery of our “spooky” Awareness Posters at halloween.infotex.com. Use them to help decorate for the holiday! Check […]
    With nearly three in four people using third-party payment services tied to their bank accounts, the risk isn’t limited to your own policies and procedures… An article review. When working on cybersecurity awareness messages for your customers you may be inclined to focus on your own systems, but a new study on security in digital […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX infotex is excited to announce that Cody Smith has joined the team as the newest Data Security Analyst. Cody holds several industry certifications (including the most recent: SSCP) as well as a B.S in Cyber Security & Information Assurance from Western Governors University. […]
    It’s all about protecting Customer information . . . In 1999 the Gramm-Leach-Bliley Act (GLBA) directed the Federal Deposit Insurance Corporation (FDIC) and other federal banking agencies to ensure that financial institutions have policies, procedures, and controls in place to prevent the unauthorized disclosure of customer financial information.  The FDIC and other federal banking agencies […]
    A Ghoulish Gallery! Just a few scary-themed Awareness posters from our collection, which you can see at posters.infotex.com! Below you will find both the vertical and horizontal versions of each of the posters, all you need to do is “right-click > “Save link as…” to download! Vertical 8.5″ x 11″ Format   Horizontal 11″ x […]
    What to Expect in an Annual Information Security Report to the Board Webinar-Movie Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from management about the information security risks and incidents, and the actions taken to address […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    With the potential to break all existing forms of encryption, quantum computing poses a unique challenge… An article review. While quantum computing has been a buzzword for some time now the technology remains largely theoretical, with small scale proofs-of-concept that still suffer from serious limitations.  That hasn’t stopped security researchers from worrying about the technology’s […]