IT Examiner School eBook

Internal Use Only

A New Reality

• The endpoint is the perimeter • The user is the perimeter • The business process is the perimeter • The information is the perimeter There is no perimeter

• Compliance ≠ security, like a firewall ≠ security • It’s a resource and budget conflict, and it splits focus Compliance may threaten security

• Security has grown well past the “do-it-yourself” days • Install and use is no longer an acceptable approach to technology • The rate of change and diversity of products makes it difficult, if not impossible, to keep up Technology without a strategy is chaos

Internal Use Only

Cybersecurity Preparedness Challenges • How does the board know that the organization is prepared?

• How can the institution measure key risk through an iterative process to examiners & board?

• How can the institution measure their inherent risk and controls to determine the maturity of their cybersecurity posture?

• FFIEC CAT Tool is on process to identify inherent risks and determine level of maturity of an institution's cyber preparedness.

4

Made with FlippingBook - Online magazine maker