Are you ready for ACET?
Great! Just ensure that your cybersecurity plan covers ACET and GLBAs latest requirements.
Regulatory compliance, including ACET, requires documented cybersecurity programs to measure the inherent risk profile and cybersecurity maturity of your credit union.
Wonderful! Regulatory accountability is on the rise. Make sure your cybersecurity solutions meet the reporting needs of your credit union’s designated personnel. Having a single cybersecurity portal makes reporting easier.
The board, or designated board committee, should be responsible for overseeing the development, implementation, and maintenance of your credit union's information security program. Additionally, they must hold senior management accountable for their actions.
IT organizations are dynamic, especially given pandemic-required changes. This is a good time to revisit your current environment and any proposed changes to your IT estate.
The asset priority will guide management’s decisions regarding internal controls and processes and security standards, and help assess controls applied by contracted third parties.
Fantastic! With the dramatic increase in attacks on financial institutions, make sure you have a complete view of your risks, especially on your endpoints.
A risk assessment focused on safeguarding customer information identifies reasonable and foreseeable internal and external threats, the likelihood and potential damage of threats, and the sufficiency of policies, procedures, and customer information systems.
Good! Log management is a foundational step in cybersecurity, but make sure to also focus on detection with around-the-clock monitoring and management of your IT estate.
Information captured in logs is critical to detecting malicious activity and providing incident responders with crucial evidence for investigations. Logs may be modified by attackers, including insiders, to hide malicious activity. IT Operations management should periodically review all logs for completeness and to ensure they have not been deleted, modified, overwritten, or compromised.
Interested in a free 30-minute ACET consultation?
Want to learn more about the state of your ACET compliance?
Thanks for Your Interest
A SilverSky cybersecurity expert will be in touch shortly to schedule your free 30-minute ACET consultation.