5 Steps to Utilizing Key Controls
Recently we’ve received a number of requests for “Key Controls” from auditors or examiners for the financial institutions we work with. Fortunately,...
We have a meeting every Monday morning to do a status update on each of the 40 financial institutions we serve as their virtual Information Security Officers. It’s an opportunity to solve unique problems as a group, identify areas where some additional expertise is needed, and spot trends in our industry.
It’s one of the most important meetings of the week and anytime I hear a recurring theme, my ears perk up as potential blog material.
Lately, I’ve been hearing the need for an evolution of how IT audits are being scoped and performed.
The typical bank network has changed in the past 5-10 years.
The crazy thing is, not all IT audits are keeping up.
It’s time for the entire banking industry to adopt a risk-based approach to IT audits.
Where is your greater risk—a typo in policy or in a BEC attack caused by a misconfiguration?
How do we do this?
Finally, all of this hinges on having a qualified CISO or ISO that knows your environment, understands risk, and can clearly communicate with the auditor. If your bank has found it hard to attract and retain expertise in that role, we have solutions that can help. Just contact us at support@bedelsecurity.com.
Recently we’ve received a number of requests for “Key Controls” from auditors or examiners for the financial institutions we work with. Fortunately,...
I recently participated in an executive meeting at a bank where we discussed the real value of “checking the box” also known as the bare minimum,...
Artificial intelligence, quantum computing, cryptocurrency, banking as a service - there’s no shortage of new technology shaking up the financial...