Is Your Risk Assessment Authentication & Access Ready?
In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance...
The cybercriminals are still on top of their game, changing targets and tactics. The work-from-home revolution continues and the drive for automation continues across industries. All of these changes affect cybersecurity risk and those profiles should be considered in our information security plan.
This points to the need for risk assessments to be a regular practice, not only an annual exercise, and the examiners agree. We have heard many calls for ongoing risk assessments, especially when implementing new security tools that require privileged access, citing the recent supply chain attacks as the poster child for understanding and limiting access to the minimum necessary and ensuring proper controls are in place.
So, how do we go about this?
If you need help with your risk assessments or understanding the process, please contact us at support@bedelsecurity.com.
Inherent and Residual Risk
https://www.bedelsecurity.com/blog/inherent-and-residual-risk
The Virtual CISO Whitepaper
https://www.bedelsecurity.com/the-virtual-ciso-whitepaper
The Most Underrated Control in Information Security
https://www.bedelsecurity.com/blog/the-most-underrated-control-in-information-security
IT Risk Assessment vs. Vendor Risk Assessment Simplified
https://www.bedelsecurity.com/blog/it-risk-assessment-vs.-vendor-risk-assessment-simplified
In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance...
A little over a year ago, banking regulators released the “Authentication and Access to Financial Institution Services and Systems” guidance. Since...
It’s been a long and crazy two years since Covid showed up and changed the world. Yes, a lot of things are different now, but I’d like to take a few...