Back to Blog

Budgeting for Cybersecurity

By Finosec

December 14, 2021

Get notified on new insights from Finosec now!

Be the first to know about new Finosec blogs to grow your knowledge of the cybersecurity governance industry today!

The FDIC requires that within a financial institution’s budget there must be a specific allocation for cybersecurity elements. That is, that there is money going toward services, programs, and coverage related to this item. More than just a requirement, though, it is important that your institution structures the budget in such a way that you can feel confident in your cybersecurity and information security abilities. Because “cybersecurity” can tend to be a rather nebulous term, sometimes getting lumped together with all things IT, Founder and CEO Zach Duke spends a few minutes discussing how to have fruitful conversations and create an effective budget around this element. Watch the video below for more information.

First and foremost, this process is about validating, financially, initiatives that can help secure the institution and its assets. For example, this wouldn’t be expensing a dual monitor setup, but rather about implementing multi-factor authentication for your critical systems. Below are a few questions to consider as you continue this conversation: 

  1. How does this budget support the Strategic Plan? 
    In 3 years, where would you like the institution to be? Do the budgeted changes align with and support those goals?
  2. How are other team members involved in the process?
    It is important to create leadership inside the institution and cultivate a culture of cybersecurity governance that permeates throughout the business.
  3. What has changed from year to year?
    What was included last year, and how has that changed for this year? Furthermore, it is worth considering what is not approved in order to make the best decisions for your institution and staff.
  4. How is this going to be documented? 
    Documentation is vital, and making sure these items are adequately tracked and recorded will be important when auditors and examiners ask to see this information. 

We hope this information has been helpful! If you would like to read more about cybersecurity governance and stay up to date on the latest in the industry, be sure to sign up for  Finosec Academy. Centered around an innovative community, you can interact with other members and keep up on the most current information in the industry.

More from Finosec

The Critical Link Between Third-Party Risk Management (TPRM) and Access Management

The Critical Link Between Third-Party Risk Management (TPRM) and Access Management

As highlighted in a recent article from the Federal Reserve, managing third-party relationships and the access associated with those relationships is a critical component of Third-Party Risk Management (TPRM). The associated access third party vendors have to banking systems is known as Access Management and is foundational for mitigating risks associated with third-party relationships. Access Management may be easy to overlook because it does not always reside with the same person or team as TPRM; making it difficult to provide critical oversight.

With increased regulatory focus, how should institutions be thinking of Access Management? Here are five steps your institution can take today to strengthen your third-party governance.

The Critical Foundation of Managing Access to Banking Systems

The Critical Foundation of Managing Access to Banking Systems

Managing access to banking systems has become increasingly complex as financial institutions navigate legacy reporting systems, API access, and cloud solutions. These challenges, along with the risks posed by unmanaged systems, emphasize the need for maintaining a...

Why You Need to Know Every System for Every Employee

Why You Need to Know Every System for Every Employee

Are you confident that your bank has clear and thorough visibility to every employee’s physical and digital access to systems? If you’re like most banks we work with, the answer to this question is “no”. There are many challenges that make tracking employee access...

Talk To An Expert Now
Talk To An Expert Now 770.268.2765