10 Steps to Cybersecurity Continuity & Compliance


Presented by: Carly Souther
Add CD-ROM to Cart:

(Product will be shipped via USPS)


This CD ROM will be available after February 5, 2020.

More than four thousand ransomeware attacks have occurred every day since the beginning of 2016, and the risk of such attacks for your Institution continues to dramatically increase.

Despite the fact that a majority of United States organizations have experienced a cyber-attack either directly or through a vendor, most businesses do not consistently address cyber threats. Using a 10-Step Checklist, discover how your organization can create a culture of cybersecurity continuity, which is achieved when a business's people, process, and technology are aligned with secure execution of the business strategy.

This session will help you design, implement, and monitor an efficient Cybersecurity Program. You will learn about cyber risks and threats, such as DDos or DoS attack; viruses; spyware; malware & Trojans; phising scams; ransomware; worms; doxing; and, baiting. We will examine industry best practices to determine how they can support your Institution's development of effective cybersecurity governance.

We will discuss how to prioritize cyber risk and how to embed a risk management regime across your bank or credit union. Defining and communicating your Cyber Risk Management Regime is central to your Institution's overall cybersecurity strategy, and all personnel must understand that they each have a role in protecting information, customers, assets, other employees, and your corporate mission. Incident and vendor management guidance will also be provided. You will learn how to develop procedures for responding to actual or suspected cyber incidents, as well as how to test your written response and disaster recovery plans. Likewise, you will understand how to conduct an assessment of cybersecurity measures employed by third-party providers and determine whether vendor contracts address information and technology issues related to cybersecurity threats.

When designing, implementing, and monitoring your Cybersecurity Policy, your Institution must be mindful of obligations under federal and state laws. We will therefore review proposed and enacted regulatory scrutiny at both levels of government. We will discuss how state and other regulators are addressing cybersecurity within their governance. For example, did you know that (at least) 47 States have regulations requiring private, government, or educational entities to notify individuals of security breaches of information involving personally identifiable information (PII)? All attendees will receive a complimentary Toolkit to help your Institution comply with these laws.

After attending this webinar, you will be well equipped to mitigate litigation and reputational risk related to cyber breaches. This objective will be achieved through the development, implementation, and maintenance of a commercially reasonable IT infrastructure that is suitable and appropriate for your Institution's risk profile.

Covered Topics
  • Prioritize Cyber Risk. Risks to Your Institution's information and systems must be assessed with the same vigor as legal, regulatory, financial, and operation risks. Embed a Risk Management Regime across your Institution, supported by the Board and Executive Management.
  • Existing Controls. Assess and document the controls and processes currently in place. Make note of the nature, sensitivity, and location of information your organization collects and/or stores, as well as existing databases, applications, and other assets.
  • Written Cybersecurity Policy. Produce written security policies related to Network Protection, Malware Prevention, Secure Configuration of Systems, and Removable Media Controls. Establish relevant policies to comply with applicable laws and regulations.
  • Incident Management. Create and test your written response and disaster recovery plans. Develop proceures for responding to actual or suspected cyber incidents (includes a provision related to regulatory reporting.
  • Vendor Management. Conduct an assessment of cybersecurity measures employed by third-party providers. Determine whether vendor contracts address information and technology issues related to cybersecurity threats.
  • Cybersecurity Insurance. If unauthorized access to sensitive information is of concern, your organization may want to consider purchasing cybersecurity insurance.
  • Program Implementation & Monitoring. Continuously monitor all systems and networks. Analyse logs for unusual activity that could indicate an attack.
  • Personnel Training. Effective implementation of your cybersecurity strategy requires extensive officer and employee training. Discuss identified cybersecurity threats, as well as preventive measures, and how to activate the response plan once an incident is detected.
  • User Education & Awareness. You must educate clients about measures they can take to reduce their exposure to cyber risks.
  • Periodic Audit & Assessments. To prioritize existing cybersecurity vulnerabilities and mitigate internal and external cybersecurity threats, assess the impact a cybersecurity incident would have on your organization and review the effectiveness of your risk management structure.
Who Should Attend:
  • CFOs & CEOs
  • CTOs / CIOs
  • IT Management & Staff
  • Compliance Officers & Staff
  • Risk Management Officers & Staff
  • Business Continuity Officers & Staff
  • Online Banking Management & Staff
  • Operations Management & Staff
  • Personnel responsible for Third-Party Providers
  • Senior Leadership & Executive Management Teams
  • Human Resources
About the Speaker: Carly Souther is Senior Legal Counsel and Compliance Officer at Creditinfo Group, where she provides guidance on legal and compliance issues for the Group & its subsidiaries in more than 30 countries. She formerly served as General Counsel and COO of iTrain OnDemand (iTod), the Chief of Regulation at ECigIntelligence, and the Assistant General Counsel at Florida's Agency for Health Care Administration.

Carly has published on a wide range of issues in both legal and medical journals, including the Georgetown Journal on Poverty Law & Policy and the University of Iowa's Transnational Law & Contemporary Problems. She is a member of the Florida Bar, and holds an M.A. from the Universitat Autònoma de Barcelona; a J.D. from the Florida State University College of Law; and, a B.A. from Mercer University.

This program was recorded in its entirety in January 2020. The CD-ROM includes program slides, materials (if available) and follow-up Q & A document.

Add to Cart:

  • Model: cd_cyber0120
  • Manufactured by: Glia Group, Inc.

This product was added to our catalog on Tuesday 26 November, 2019.

Copyright © 2019 BankersOnline.com