2016 Vol. 100 No. 9

24 HќќѠіђџȱ юћјђџ ђѝѡђњяђџȱ2016 Continued from page 23. 7KLV LQIRUPDWLRQ LV SURYLGHG IRU JHQHUDO HGXFDWLRQ SXUSRVHV DQG LV QRW LQWHQGHG WR EH OHJDO DGYLFH 3OHDVH FRQVXOW OHJDO FRXQVHO IRU VSHFLÀF JXLGDQFH DV WR KRZ WKLV LQIRUPDWLRQ DSSOLHV WR \RXU LQVWLWXWLRQ·V FLUFXPVWDQFHV RU VLWXDWLRQ 1 FFIEC Cybersecurity Assessment Tool (June 2015). 2 Although the original Tool was released in a static PDF format that was not user-friendly, the Ž¡Š–’—Ž›œȱŠ›Žȱ—˜ȱ•’”Ž•¢ȱ˜ȱŒ˜—œ’Ž›ȱ ’œȱ‹ŠœŽ•’—ŽȱŒ˜—›˜•œȱ˜ȱ‹ŽȱœžĜŒ’Ž—ǰȱ’ȱ ‘Žȱ’—œ’ž’˜—Ȃœȱ’—‘Ž›Ž—ȱ›’œ”ȱ•ŽŸŽ•ȱ’œȱ ȃ ’—’ęŒŠ—Ȅȱ˜›ȱŠȱ™Š›’Œž•Š›ȱ˜–Š’—ǯ ȱ ˜ȱ ‘Šȱ’œȱ˜˜ȱŽ—˜ž‘ȱ˜ȱ™Šœœǵȱ ˜—œž•ȱ‘Žȱ›ž‹›’Œǯȱ Š—ŠŽ–Ž—ȱŒŠ—ȱ ›ŽŸ’Ž ȱ‘ŽȱŽŒ•Š›Š’ŸŽȱœŠŽ–Ž—œȱ˜ȱ Œ˜—›˜•œȱŠȱ‘’‘Ž›ȱ–Šž›’¢ȱ•ŽŸŽ•œȱ˜ȱ ŽŽ›–’—Žȱ‘Žȱ™˜•’Œ’Žœǰȱ™›˜ŒŽž›Žœǰȱ ™›˜ŒŽœœŽœȱŠ—ȱŒ˜—›˜•œȱ‘Šȱ‘Žȱ ’—œ’ž’˜—ȱŒŠ—ȱŠ˜™ȱ˜ȱ’–™›˜ŸŽȱ‘Žȱ ’—œ’ž’˜—ȂœȱŒ¢‹Ž›ȱ›’œ”ȱ™›Ž™Š›Ž—Žœœǯ ȱ ›Žȱ¢˜žȱ›ŽŠ¢ȱ˜›ȱŽ¡Š–œǵȱ ŽŽȱ‘Žȱ ›ž‹›’ŒǰȱŠ—ȱœŒ˜›Žȱ Ž••ǯȱȱȱ ȱ ȱŒ˜–™•’–Ž—Š›¢ȱ ȱŒ˜–™•’Š—ŒŽȱ Œ˜—Ž›Ž—ŒŽȱ‘˜œŽȱ‹¢ȱ ȱ Š›—Ž›œȱ ȭȱȃ ˜’—ȱ Ž••ȱ‹¢ȱ ˜’—ȱ ˜˜Ȅȱȭȱ’œȱ œŒ‘Žž•Žȱ˜›ȱ ŒǯȱŜȬŝȱŠȱ‘Žȱ Š¢•˜›ȱ ™›¢•Š—ȱ ˜Ž•ȱ’—ȱ Šœ‘Ÿ’••Žǰȱ Ž—Ȭ —ŽœœŽŽǯȱ ĴŽ—ŽŽœȱ ’••ȱ•ŽŠ›—ȱŠ‹˜žȱ œ›ŠŽ’Žœȱ˜›ȱŽŠ›—’—ȱ ȱŒ›Ž’ǰȱ ‘’•Žȱ™›˜ŽŒ’—ȱ‘Žȱ•’ŸŽœȱ˜ȱ—ž›œ’—ȱ ‘˜–Žȱ›Žœ’Ž—œȱ‘›˜ž‘ȱ‘Žȱ Ž—’˜›ȱ ›’–Žœ˜™™Ž›œȱ™›˜›Š–ǯ ȱ ‘’œȱŒ˜—Ž›Ž—ŒŽȱ™›˜Ÿ’Žœȱž™ȱ˜ȱ ǞŘŖŖȱ’—ȱ›ŠŸŽ•ȱ›Ž’–‹ž›œŽ–Ž—œǰȱŠȱ Œ˜–™•’–Ž—Š›¢ȱ‘˜Ž•ȱ›˜˜–ȱŠ—ȱ –ŽŠ•œȱ‘›˜ž‘˜žȱ‘ŽȱŽŸŽ—ǯȱ ˜›ȱ –˜›Žȱ’—˜›–Š’˜—ȱŠ‹˜žȱ‘ŽȱŒ˜—Ž›Ȭ Ž—ŒŽǰȱŒ˜—ŠŒȱ ˜›’ȱ ’••Š›ȱ ’‘ȱ ȱ Š›—Ž›œȱŠȱŞŝŝȬŘřŘȬŖŞśşǰȱŽ–Š’•DZȱ ˜›’ǯ ’••Š›ȓœ‘Œ™˜ž—Š’˜—ǯ˜›ǰȱ˜›ȱŸ’œ’ȱ œ‘Œ™˜ž—Š’˜—ǯ˜›ȦŒ˜—Ž›Ž—ŒŽǯ ȱ ȱ Š›—Ž›œǰȱ™˜ Ž›Žȱ‹¢ȱ‘Žȱ Ž—’˜›ȱ ˜žœ’—ȱ ›’–Žȱ ›ŽŸŽ—’˜—ȱ ˜ž—Š’˜—ǰȱ’œȱŠȱ ›ŽŽ››Žȱ Ž›Ÿ’ŒŽȱ ›˜Ÿ’Ž›ȱ˜ȱ‘Žȱ —’Š—Šȱ Š—”Ž›œȱ œœ˜Œ’Š’˜—ǯȱ ‘Žȱ˜›Š—’£Š’˜—ȱ˜ěŽ›œȱ Šȱ‘›ŽŽȬ–’—žŽȱŸ’Ž˜ȱ˜ŸŽ›Ÿ’Ž ȱ˜ȱ ꗊ—Œ’Š•ȱŽ¡™•˜’Š’˜—ȱ˜ȱ‘ŽȱŽ•Ž›•¢ǯȱ ˜ȱŸ’Ž ǰȱ˜ȱ˜ȱHoosier Banker Digitalȱ Šȱ’—’Š—Š‹Š—”Ž›œǯ˜›ǰȱŠ—ȱŒ•’Œ”ȱ˜—ȱ ‘Žȱ›Žȱ ˜ž ž‹ŽȱŠ››˜ ȱŠ‹˜ŸŽǯȱȱ CRA Partners Conference Financial Services Information Sharing and Analysis Center has collaborated with members of the Financial Services Sector Coordinating Council to create an automated version of the Tool to DVVLVW ÀQDQFLDO LQVWLWXWLRQV RI DOO VL]HV WR FROOHFW and score their responses to the Tool. See www. fsisac.com/article/fsscc-automated-cybersecurityassessment-tool 3 The Tool’s Appendix B is a mapping of the Tool to the NIST’s cybersecurity framework. See FFIEC Cybersecurity Assessment Tool,Appendix B: Mapping Cybersecurity Assessment Tool to NIST Cybersecurity Framework (June 2015). 4 FRB 6XSHUYLVLRQ DQG 5HJXODWLRQ /HWWHU, SR 15-9 (July 2, 2015). 5 OCC %XOOHWLQ 2015-31 (June 30, 2015). 6 See FDIC, Cybersecurity Assessment Tool, Financial Institutions Letters, FIL-28-2015 (Jul. 2, 2015) (“FDIC examiners will discuss the Cybersecurity Assessment Tool with institution management during examinations to ensure awareness and assist with answers to any questions.).The National Credit Union Administration likewise has announced that it will incorporate the Tool into its examination process in the second half of 2016. See NCUA, NCUA Letter to Credit Unions, Letter No. 16-CU-01, 2 (Jan. 2016). 7 FFIEC Cybersecurity Assessment Tool, User’s Guide 3 (June 2015). 8 Id. at 6-7. 9 The Tool’s Appendix A is a mapping of the Tool’s Baseline statements to the FFIEC’s ,7 ([DPLQDWLRQ +DQGERRN. See FFIEC Cybersecurity Assessment Tool,Appendix A: Mapping Baseline Statements to )),(& ([DPLQDWLRQ +DQGERRN (June 2015). Šœ˜—ȱ ǯȱ Ž••¢ȱ ‘Šœȱ‹ŽŽ—ȱŽ•ŽŒŽȱ ˜ȱ‘Žȱ‹˜Š›ȱ˜ȱ ’›ŽŒ˜›œȱ˜ȱ ™›’—œȱ Š••Ž¢ȱ Š—”ȱǭȱ ›žœȱ ˜–™Š—¢ǰȱ French Lickǯȱ ȱ ŒŽ›’ꮍȱ™ž‹•’Œȱ ŠŒŒ˜ž—Š—ǰȱ‘ŽȱœŽ›ŸŽœȱŠœȱ™›Žœ’Ž—Ȧ ȱ˜ȱ ǷȱŠ—ȱ™›ŽŸ’˜žœ•¢ȱ œŽ›ŸŽȱŠœȱŒ‘’Žȱꗊ—Œ’Š•ȱ˜ĜŒŽ›ȱ˜ȱ Š›Š˜—ȱ ŽŸŽ•˜™–Ž—ǯȱ Ž••¢ȱ’œȱŠȱ ‹˜Š›ȱ–Ž–‹Ž›ȱŠ—ȱ›Š—ȱŒ˜––’ĴŽŽȱ –Ž–‹Ž›ȱ˜ȱ‘Žȱ ž‹˜’œȱ ˜ž—¢ȱ ˜––ž—’¢ȱ ˜ž—Š’˜—ǰȱ ž—’˜›ȱ Œ‘’ŽŸŽ–Ž—ȱŠŸ’œ˜›¢ȱ‹˜Š›ȱ–Ž–‹Ž›ȱ Š—ȱŒ‘Š’›™Ž›œ˜—ȱ˜ȱ‘Žȱ ——žŠ•ȱ ž‹˜’œȱ ˜ž—¢ȱ Š••ȱ˜ȱ Š–Žǯȱ Žȱ ŽŠ›—ŽȱŠȱ‹ŠŒ‘Ž•˜›ȂœȱŽ›ŽŽȱ›˜–ȱ ž›žŽȱ —’ŸŽ›œ’¢ȱŠ—ȱŠȱ–ŠœŽ›Ȃœȱ Ž›ŽŽȱ›˜–ȱ —’Š—Šȱ —’ŸŽ›œ’¢ǯ ȱȱ ›Ž˜›¢ȱ –’•Ž¢ȱ ‘Šœȱ‹ŽŽ—ȱŽ•ŽŒŽȱ ˜ȱ‘Žȱ‹˜Š›ȱ˜ȱ ’›ŽŒ˜›œȱ˜ȱ ’›œȱ Š—”ȱ˜ȱ Ž›—Žǯȱ ŽȱœŽ›ŸŽœȱŠœȱ Ÿ’ŒŽȱ™›Žœ’Ž—ȱ˜ȱ ꗊ—ŒŽȦ›ŽŠœž›Ž›ǰȱ Œ‘’Žȱꗊ—Œ’Š•ȱ˜ĜŒŽ›ȱŠ—ȱŒ‘’Žȱ ˜™Ž›Š’—ȱ˜ĜŒŽ›ȱ˜›ȱ ž—’—˜—ȱ FROM THE BOARD ROOM —’ŸŽ›œ’¢ǯȱ –’•Ž¢ȱ‘Šœȱřřȱ¢ŽŠ›œȱ ˜ȱ‹Š—”’—ȱŽ¡™Ž›’Ž—ŒŽǰȱ ’‘ȱ™›’˜›ȱ ™˜œ’’˜—œȱŠœȱŒ‘’Žȱ˜™Ž›Š’—ȱ˜ĜŒŽ›ȱ ˜ȱ’ ȱ ’—Š—Œ’Š•ȱ Š—”ȱŠ—ȱŠœȱ ™›Žœ’Ž—ȱŠ—ȱ ȱ˜ȱ Š›”•Ž Š—”Dzȱ Š’’˜—Š••¢ȱ‘ŽȱœŽ›ŸŽȱ ’‘ȱ ›Š‹’••ȱ Š—”ǰȱ ’ Žœȱ ˜––Ž›ŒŽȱ Š—”ȱ Š—ȱ —‘˜—¢ȱ Š¢—Žȱ Š—”ǯȱ ž››Ž—ȱ Œ˜––ž—’¢ȱ’—Ÿ˜•ŸŽ–Ž—ȱ’—Œ•žŽœȱ ‘Žȱ ž—’—˜—ȱ ˜ž—¢ȱ ˜––ž—’¢ȱ ˜ž—Š’˜—ǰȱ ˜Š›¢ȱ —Ž›—Š’˜—Š•ȱŠ—ȱ ž—’—˜—ȱ •ž‹ǯȱ ŠœȱŠĜ•’Š’˜—œȱ ‘ŠŸŽȱ’—Œ•žŽȱ ž—’—˜—ȱ ˜ž—¢ȱ —’ꮍȱ Œ˜—˜–’Œȱ ŽŸŽ•˜™–Ž—ǰȱ ȱ˜ȱ ˜›‘Ž›—ȱ —’Š—ŠȱŠ—ȱ‘Žȱ ‹Š—”Ž›œȱŠŸ’œ˜›¢ȱ‹˜Š›ȱ˜ȱ‘Žȱ ›ŠžŠŽȱ Œ‘˜˜•ȱ˜ȱ Š—”’—ȱǻ ǼȱŠȱ ‘Žȱ —’ŸŽ›œ’¢ȱ˜ȱ ’œŒ˜—œ’—ǯȱ –’•Ž¢ȱ ŽŠ›—ŽȱŠȱ‹ŠŒ‘Ž•˜›ȂœȱŽ›ŽŽȱ›˜–ȱ ž—’—˜—ȱ —’ŸŽ›œ’¢ȱŠ—ȱŠ—ȱ ȱ ›˜–ȱ —’Š—Šȱ Žœ•Ž¢Š—ȱ —’ŸŽ›œ’¢ǰȱ Š—ȱ‘Žȱ‘ŠœȱŒ˜–™•ŽŽȱ‘Žȱ ȱŠȱ‘Žȱ —’ŸŽ›œ’¢ȱ˜ȱ ’œŒ˜—œ’—ǰȱ –Ž›’ŒŠ—ȱ Š—”Ž›œȱ œœ˜Œ’Š’˜—ȱ Š’˜—Š•ȱ ˜––Ž›Œ’Š•ȱ Ž—’—ȱ Œ‘˜˜•ȱŠ—ȱ ‘Žȱ —’Š—Šȱ Š—”Ž›œȱ œœ˜Œ’Š’˜—ȱ ˜––Ž›Œ’Š•ȱ Ž—’—ȱ Œ‘˜˜•ǯȱ

RkJQdWJsaXNoZXIy MTg3NDExNQ==