2026 Pub. 14 Issue 1

FROM ANSWERING QUESTIONS TO PROVING CONTROLS Under the CAT, institutions largely demonstrated compliance by completing structured questionnaires. If you had a backup process, you answered “yes.” If you had vendor management procedures, you marked the appropriate maturity level. The NIST CSF 2.0 model moves beyond self-attestation. Regulators increasingly expect evidence. For example, it is no longer enough to state that backups occur. Institutions should be prepared to show: • The written policy governing backups • The procedures staff follow • System logs proving backups are running as scheduled • Oversight demonstrating management review This evidence-based approach applies across governance, access management, incident response and third-party oversight. It requires documentation, monitoring and accountability at a level many smaller institutions have not historically needed. THE SCALE DIFFERENCE The gap between CAT and CSF 2.0 can feel significant, especially for community institutions. The CAT framework was centered on inherent risk categories and maturity domains. CSF 2.0 organizes cybersecurity into core functions such as Govern, Identify, Protect, Detect, Respond and Recover, with detailed outcomes beneath each. In practical terms, this means: • More controls to map to policies • More documentation to maintain • More technical configurations to monitor • Ongoing evidence collection, not periodic review For IT teams of two or three people, this can feel overwhelming. What once required completing an assessment may now require building a structured control environment with continuous validation. WHAT EXAMINERS ARE LOOKING FOR The good news is that regulators appear to understand that transition takes time. Early supervisory conversations suggest examiners are focusing on preparedness rather than immediate perfection. Institutions should be ready to demonstrate: 1. Framework Selection: A documented decision to transition from CAT to a recognized framework such as CSF 2.0 2. Gap Assessment: An honest evaluation of where current controls fall short 3. Board Oversight: Evidence that directors are informed and engaged in the transition 4. Execution Plan: A timeline with defined milestones and resource planning Cybersecurity Compliance After FFIEC CAT New Expectations for Financial Institutions BY BRYAN BOAM, CEO, Azureity Inc. For nearly a decade, financial institutions relied on the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool (CAT) as a practical way to measure cyber risk. When it was introduced in 2015, it gave financial institutions a structured starting point. For many organizations, it was the first time cybersecurity had been framed in a way that boards and executives could clearly understand. The CAT worked because it was straightforward. It helped institutions assess inherent risk and answer maturity questions using a structured, mostly yes-or-no format. That simplicity allowed community and regional institutions to improve their cyber posture without building large compliance teams. But the threat landscape has changed. Cyber risks now move faster than static assessment tools can keep pace. Ransomware, cloud migration, third-party risk and regulatory scrutiny have all increased significantly since 2015. In response, the FFIEC announced that the CAT would be retired and encouraged institutions to transition to more comprehensive frameworks, including the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 2.0. This shift is more than a paperwork update; it represents a fundamental change in expectations. Utah Banker 14

RkJQdWJsaXNoZXIy MTg3NDExNQ==