by Zach Duke | Mar 6, 2025 | Community Banking, Banking, Banks, Cybersecurity, IT
Preparing for audits and exams can be an unnerving task, especially when spreadsheets are at the heart of the process. While spreadsheets have long been a go-to tool for many organizations, they often come with hidden costs that hinder efficiency. In this blog,...
by Zach Duke | Feb 21, 2025 | Cybersecurity, Community Banking, Cybersecurity Assessment Toolkit, IT, IT Security, Regulatory, Risk, Risk Assessment, Risk Management
The Risks of Spreadsheets in Cybersecurity and Why It’s Time to Move On As regulators phase out legacy tools like the Cybersecurity Assessment Toolkit (CAT), it’s the perfect opportunity for institutions to rethink their approaches to governance and risk management....
by Zach Duke | Feb 13, 2025 | Cybersecurity, Banking, Community Banking, Information Security Officer, Regulatory, Risk Assessment
In an industry where cybersecurity threats continue to evolve, community banks must ensure that governance and oversight processes are airtight. Yet, many still rely on spreadsheets to manage critical security tasks, compliance tracking, and risk assessments. While...
by Zach Duke | Jan 24, 2025 | Information Security, Community Banking, Cybersecurity, IT, IT Security, Risk Management
In the world of cybersecurity and third-party risk management, spreadsheets have become a popular tool. Institutions often use them for tasks such as tracking exceptions from audits, managing access rights, and conducting risk assessments. Despite their frequency of...
by Zach Duke | Dec 17, 2024 | Access Mangement, Community Banking, Cybersecurity, FDICIA, FFIEC, Information Security, IT, User Access
For financial institutions subject to FDICIA, the Federal Deposit Insurance Corporation Improvement Act, the annual management attestation is a critical declaration of compliance. It signifies that the institution’s internal controls over financial reporting (ICFR)...
by Zach Duke | Nov 7, 2024 | Risk Management, Community Banking, Cybersecurity, IT, IT Security, Uncategorized, User Access
As highlighted in a recent article from the Federal Reserve, managing third-party relationships and the access associated with those relationships is a critical component of Third-Party Risk Management (TPRM). The associated access third party vendors have to banking...