Rebecca Herold is a nationally-known author and consultant who won national awards for her successful risk management and information protection programs while directing the information security program for Principal Financial Group. She shares her experience building effective information protection programs and also...
Federal regulations require many organizations to conduct independent testing of their computing and networking environment at regular intervals. Many organizations comply with this requirement by conducting penetration testing and vulnerability analyses. These tests offer a snapshot of an organization's security...
The sixth anniversary of September 11th draws near, and the question floating among those in the financial services industry remains, “Is my institution ready in the event another 9-11 happens?â€For information security expert William Crowell, his thinking is that by having a completely integrated and...
Vendor Management is one a regulatory hot-button - a key focus of examinations. Register for this webinar to learn:
Legal requirements for ensuring sound vendor security practices
The risks involved with outsourcing
How to mitigate those risks
How to ensure the vendor complies with regulatory responsibilities
How...
Register for this updated webinar to receive:
A heads-up on key examination issues
Review of the IT Risk Management Program Examination Process
Overview of IT Examination Officer's Questionnaire
What to expect, and how to respond
Listen to Susan Orr CISA, CISM, CRP - ex-FDIC examiner respond to some of the FAQs from our IT risk assessments webinar. See below for a sampling of the questions asked.
A look at what the regulatory agencies base IT exams on and how your institution can be best prepared
Preparing for the pre-examination IT Questionnaire and the effect your responses will have
How do GLBA Section 501(b), the Bank Secrecy Act, Patriot Act, and FACTA figure into a regulatory IT exam
Examination of IT risk assessments and how they are vital to financial institutions
A look at why IT risk assessments are important to your organization
How an IT risk assessment is performed
Sample assessment matrix included
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.