Information Technology Video
(Speaker 1) Welcome to this video on information technology, or IT, for bank directors and trustees. In this video, we’ll highlight how banking operations and technology are interconnected, along with the challenges this may present. We’ll discuss a bank’s information security program, or ISP, which is designed to address those challenges and is an important element in support of a bank’s management of IT risks. From there,
we’ll discuss director responsibilities for overseeing the bank’s IT environment. Finally, we’ll talk about the FDIC’s evaluation of these areas during IT examinations. (Speaker 2) So, let’s get started. Today, we know more than ever that technology is essential to successful banking operations. We also know that competition and consumer demand drive technology innovations and
product offerings. These innovations create more contact points with customers and third parties. And these additional contacts in a dynamic cyber threat environment can introduce challenges and complexities in managing risk effectively. (Speaker 1) Cyber-attacks like phishing, ransomware, and distributed denial of service, commonly known as DDoS, can introduce financial, operational, legal, and reputational risks. Third-party failures can inject similar risks through reduced availability or functionality. (Speaker 2) To protect customer information, banks maintain dynamic information security programs or ISPs. Appendix B to Part 364 of
the FDIC’s Rules and Regulations, Interagency Guidelines Establishing Information Security Standards, which we’ll refer to in this video as Appendix B, defines an ISP’s requirements. Appendix B requires that banks implement a written ISP that includes administrative, technical, and physical safeguards appropriate for a bank’s size and complexity as well as the nature and scope of its activities. Safeguards include policies, procedures, controls, and assurance reviews designed to protect a bank’s information assets. Information assets are the data, systems, and physical locations that a bank uses to house information. Importantly, information
assets also include customer information. The ISP integrates the process of assessing, managing, controlling, and reporting risks to protect the confidentiality, integrity, and availability of information. (Speaker 1) Let’s first talk a little about assessing risks. A bank assesses risk by analyzing threats and vulnerabilities, while considering mitigating controls. A threat is any circumstance or event with the potential to adversely impact operations, assets, or individuals through unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Vulnerabilities are weaknesses in systems, security procedures, internal controls, or implementation that could be exploited by a threat. Inherent risk is the level of risk present, as determined by assessing identified
threats and vulnerabilities, before any mitigating actions. Once management determines the level of inherent risk, they assess the sufficiency of existing controls that mitigate the inherent risk in order to measure residual risk or the risk that remains. Inherent risks can be lessened with the right security controls. Residual risks cannot be prevented entirely, no matter what measures are taken and will continue to exist regardless of the controls in place. If residual risk exceeds a bank’s risk appetite, additional controls or risk transfer activities may be necessary. This could
include security measures such as access controls on information systems, or access restrictions for physical locations. It may also include other measures such as dual control procedures, segregation of duties, or cyber insurance. (Speaker 2) In addition to a control structure, an ISP includes processes for staff training, control testing, threat intelligence, incident response, and third-party oversight. Further, an effective ISP will address changes in technology, customer information sensitivity, threats, business arrangements, and customer information systems. Finally, at least annually, a bank should report to its board or a designated board committee on the status of the bank’s ISP and conformance with Appendix B. Now, let’s take this introduction to an ISP a step further. A bank’s ISP is designed to not only
outline how information will be protected, but also to support the bank’s management of IT risks, which in turn supports the bank’s risk management framework. So now, let’s talk more about IT risks and how they are managed. (Speaker 1) The IT risk management process supports a bank’s overall risk management framework through risk identification, measurement, mitigation, and monitoring and reporting. We’ll explore each of these steps, beginning with identification. All activities within a bank pose some level of risk. As we mentioned, the level of risk present prior to the bank taking any mitigating actions is called inherent risk. Effective management begins the process of identifying inherent risk by completing an asset inventory, which would include a bank’s hardware, software, and information assets. Management then identifies
events that could potentially occur, such as a natural disaster, a cyber-attack, or any other reasonably foreseeable threat, and evaluates the potential impact on the bank’s assets. Finally, management identifies existing controls that may mitigate risk. Comprehensive risk identification includes cybersecurity risks, as well as those identified in any other information security risk assessments. (Speaker 2) Once risks are identified, risk measurement helps a bank estimate the probability of an adverse event and its potential impact across the institution.
IT risk measurement is an important component of risk management since an event can impact multiple areas or functions of a bank. Risk measurement may be qualitative, relying on experience, judgment, and intuition; quantitative, based on numerical data; or a combination of qualitative and quantitative measurements. Typically, a combined approach to measuring risk provides a more comprehensive analysis. Regardless of the approach used, a bank should estimate the likelihood of an event occurring and the severity of its impact. After measuring risk, management determines how
to mitigate it. Risk mitigation reduces risks through specific controls or risk transfers such as: IT policies, standards, and procedures; internal controls; business continuity plans; third-party management programs; and insurance for IT operations. To monitor risk, management will review the effectiveness of risk mitigation activity and changing threat conditions. This monitoring of risk includes ensuring that controls are effective and quality assurance and control practices function as intended. Risk monitoring supports the bank’s IT risk reporting process, which we’ll talk a little more about in a few minutes. (Speaker 1) Bank management typically handles the IT risk management process that we just discussed. Let’s talk a little more about
bank management responsibilities. Typically, bank management is responsible for administering the day-to-day IT operations of the bank, implementing IT governance and effective processes for IT risk management, reviewing and annually approving processes for IT risk management, assessing the bank’s inherent IT risks across all departments, providing regular reports to the board on IT risks, IT strategies, and IT changes, coordinating priorities between the IT department and lines of business, establishing a formal process to obtain, analyze, and respond to information on threats and vulnerabilities, and ensuring that hiring and training practices are governed by appropriate policies to maintain competent and trained staff. (Speaker 2) For directors, their responsibilities include overseeing IT risk management development, implementation, and maintenance that is performed by bank management Let’s talk more about the oversight role of directors. First, the board approves a bank’s IT strategic plan. An IT strategic plan should align with a bank’s overall business strategy, and consider both human and financial resources. IT strategic plans vary based on the size and structure of an organization. However, in all cases, new initiatives pertaining to IT should be considered in light of a bank’s overall strategy. If this consideration doesn’t occur, it could result in poor performance or unplanned
costs. For example, consider the consequences that could result from deploying a mobile banking product without evaluating whether the bank has the proper infrastructure to administer the product or provide good customer service. (Speaker 1) Directors also oversee outsourced relationships with third-party providers. A third-party risk management program generally involves several key elements: planning, due diligence and third-party selection, contract negotiation, ongoing monitoring, and termination. The depth of the work performed under each element depends on how critical the third-party arrangements are to the bank. The board would be responsible for ensuring
that management’s efforts are commensurate with the criticality of each third-party provider. For example, expectations for a network security-monitoring firm would likely be higher than for an office cleaning service. (Speaker 2) Directors are also responsible for ensuring the bank has effective business continuity plans that describe the preparation for and resiliency to risks. Continuity plans would define the steps that bank personnel and third parties will take to maintain or recover the bank’s staffing, core business processes, and data. Further, plans would outline procedures for incident resolution, escalation, and reporting to the board and applicable government agencies. To fulfill their responsibility, a board should
expect to receive reports that consider factors such as financial impact, operational downtime, system breach, or loss of infrastructure. (Speaker 1) Directors also approve policies that guide a bank’s IT functions. Policies need periodic reviews to ensure that they remain compatible with a bank’s strategic plans and with applicable rules and regulations. Effective policies clearly
communicate objectives for system requirements as well as risk tolerances. To be most effective, policies should be appropriate for the size and complexity of operations, products, and risks. Directors will want to ensure that they have qualified personnel managing the IT function. Of note, Appendix B requires the board to assign specific responsibility for implementing the ISP. Depending on the size and complexity of the bank, the board may decide to assign other key roles and responsibilities to positions such as a chief information officer or chief information security officer. Many banks have a need to supplement staffing with third-party expertise. When third parties perform critical operations, the board should ensure that management defines expectations within the contract and service-level agreements. (Speaker 2) Along with retaining qualified staff, directors will want to ensure there is comprehensive IT training. To be effective,
all staff, including board members, need security and cyber awareness training tailored to their position. Improving staff expertise through training can enhance their ability to perform and support objectives set forth in a bank’s strategic plan. Additionally, comprehensive IT training supports succession planning for IT functions, which helps to provide continuity in operations and security in the absence of key staff. (Speaker 1) Another board responsibility
is to monitor the bank’s IT function, which is typically done through management reporting. Reports will usually provide periodic status updates or include summaries pertaining to IT management activities. Directors should determine the frequency of reporting, and clearly communicate the key performance indicators or key metrics they want management to include in reports. As a reminder, Appendix B requires annual board reports that cover the overall status of the ISP. These annual reports may include information about risk assessments;
results of disaster recovery and business continuity planning and testing; and updates on major projects, priorities, third-party reviews, and cybersecurity incidents. Annual reports to the board may also include any management recommendations for changes to the ISP. Typically, boards also receive summary reports on various IT management activities, such as system patching or third-party monitoring. The information garnered from these types of summary reports will aid the Board in its IT risk management governance responsibilities. For example, a monitoring
report may show that a server is operating close to maximum capacity. From a strategic standpoint, the Board will want to know what options management has considered to address this issue, which might include replacing the server or outsourcing the server function. (Speaker 2) In addition to day-to-day monitoring activities, audits enable boards to confirm that controls are effective. The board would ensure that independent audits of the IT risk management process are conducted. Audits typically test compliance with laws and regulations, board-established policies,
risk limits, and control practices. Internal audit programs at community banks can take different forms. Some banks have an internal audit department while many outsource all or parts of the audits, such as vulnerability assessments. Regardless, a key point is to ensure that auditors are independent and qualified. And, as with all audits, attentive directors will evaluate the findings and ensure that senior management corrects the deficiencies. Effective boards will also ensure that the audit program is reviewed periodically and that it covers new product lines, higher-risk activities, and emerging areas of concern. (Speaker 1) The board of directors sets
the tone and direction for a bank and effective boards understand IT activities and risks. Now, let’s discuss how the FDIC conducts an IT examination. The FDIC evaluates IT risk management during IT examinations and assesses a bank’s program under the Uniform Rating System for Information Technology, or URSIT. The rating system has four components: Audit, Management, Development and Acquisition, and Support and Delivery. Cybersecurity and information security risk management are inherent in all of these components. (Speaker 2) When evaluating
the Audit component, examiners consider the scope and frequency of the audit program. Additionally, examiners assess the audit program’s independence and the auditor’s qualifications. Examiners also ensure that management addresses audit findings in a timely manner. Examiners assess the Management component by evaluating the bank’s IT risk management program, which includes the board’s oversight. Additionally, examiners review the bank’s ISP to understand management’s risk assessments, control decisions, and third-party management. Examiners also review the bank’s various internal reports to evaluate how well the board and management comply with laws and regulations. To evaluate the Development and Acquisition component, examiners assess the bank’s
ability to develop or acquire and maintain IT solutions that meet the bank’s business and security needs. Examiners also evaluate practices for project management, system changes, and development activities. The final component, Support and Delivery, considers how secure the operating environment is. Examiners assess logical and physical access controls, system monitoring, and incident response procedures. This component also includes the evaluation of the bank’s resiliency, disaster recovery, and business continuity plans and testing. In addition, examiners review operational controls and processes. (Speaker 1) Examiners assign
ratings for all components and the composite based on their findings, including the review of cybersecurity and information security. Generally speaking, a 1 rating indicates strong performance with no supervisory concern, a 2 rating indicates satisfactory performance, with modest weaknesses correctable in the normal course of business, a 3 rating indicates less than satisfactory performance, with some degree of supervisory concern, a 4 rating indicates deficient performance, meaning that operations may impair future viability of the bank and close supervisory attention is necessary, and a 5 rating indicates critically deficient performance in need of immediate remedial action and ongoing supervisory attention. (Speaker 2) In summary, technology is foundational to banking operations. It impacts how the bank connects with customers and facilitates transaction processing. A bank’s ISP, or information security program, is designed to address the challenges associated with this environment and support a bank’s IT risk management process. Directors are responsible for overseeing their bank’s IT function. With
the rapid pace of technological change, it is important that directors devote adequate time to learn about the bank’s use of technology and its inherent risks. Maintaining an awareness of changes in technology and the risk environment will help the board effectively perform its oversight responsibilities. (Speaker 1) As we conclude, we’d like to remind you that the FDIC has additional videos and resources that can be found on the Banker Resource Center at www.fdic.gov. If you need additional information or have questions or comments,
please contact your bank’s Case Manager or email the FDIC at supervision@fdic.gov. Thank you for viewing this video. We hope you found it both useful and informative.
2023-12-06 09:43