JWIC Global - The financial markets and regulatory global solution
  • HOME
  • TEAM
    • CAREER >
      • Career Opportunities
  • SERVICES
    • REGULATORY ADVISORY
    • CYBERSECURITY >
      • How JWIC can help? >
        • 23 NYCRR PART 500 Q&A
        • 23 NYCRR PART 500
        • FFIEC CYBER SECURITY ASSESSMENT TOOL
    • ANTI-MONEY LAUNDERING >
      • Model Validation
      • AML/BSA, OFAC Compliance >
        • Pillar 1 - Compliance - Board Approved Compliance Program
        • Pillar 2 - BSA/AML/TF Compliance Training
        • Pillar 3 - BSA Officer - Day-to-day monitoring
        • Pillar 4 - Compliance Audit
        • Pillar 5 - KYC - Monnitoring - Beneficial OwnershipCompliance
        • - Special Look-back Investigation -Compliance
        • One Platform AML Documentation Interface Implementation
    • RISK MANAGEMENT >
      • Operations
    • OUTSOURCING SERVICES
  • Contact
  • PORTAL
    • Consultants sign - in
  • Links

FFIEC Cyber Security

​Assessment Tool 

Picture
Picture

THE CYBER SECURITY ASSESSMENT TOOL



In light t of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council (FFIEC) developed the Cybersecurity Assessment Tool (Assessment) to help institutions identify their risks and determine their cybersecurity preparedness. The Assessment provides a repeatable and measurable process for financial institutions to measure their cybersecurity preparedness over time.
The following resources can help management and directors of financial institutions understand supervisory expectations, increase awareness of cybersecurity risks, and assess and mitigate the risks facing their institutions.

Overview for Chief Executive Officers and Boards of Directors (PDF)
Cybersecurity Assessment Tool (PDF) (Update May 2017)
  • User’s Guide (PDF) (Update May 2017)
  • Inherent Risk Profile (PDF) (Update May 2017)
  • Cybersecurity Maturity (PDF) (Update May 2017)

Additional Resources
  • Appendix A: Mapping Baseline Statements to the FFIEC IT Handbook (PDF) (Update May 2017)
  • Appendix B: Mapping to NIST Cybersecurity Framework (PDF)
  • Appendix C: Glossary (PDF)

FFIEC Cybersecurity Assessment Tool Presentation View Slides (PDF) | View Video



Process Flow for Institutions:


Step 1: Read Overview for Chief Executive Officers and Boards of Directors to gain insights on the benefits to institutions of using the Assessment, the roles of the CEO and Board of Directors, a high-level explanation of the Assessment, and how to support implementation of the Assessment.

Step 2: Read the User's Guide (Update May 2017) to understand all of the different aspects of the Assessment, how the inherent risk profile and cybersecurity maturity relate, and the process for conducting the Assessment.

Step 3: Complete Part 1: Inherent Risk Profile of the Cybersecurity Assessment Tool (Update May 2017) to understand how each activity, service, and product contribute to the institution’s inherent risk and determine the institution’s overall inherent risk profile and whether a specific category poses additional risk.

Step 4: Complete Part 2: Cybersecurity Maturity of the Cybersecurity Assessment Tool (Update May 2017) to determine the institution’s cybersecurity maturity levels across each of the five domains.

Step 5: Interpret and Analyze Assessment Results to understand whether the institution’s inherent risk profile is appropriate in relation to its cybersecurity maturity and whether specific areas are not aligned. If management determines that the institution’s maturity levels are not appropriate in relation to the inherent risk profile, management should consider reducing inherent risk or developing a strategy to improve the maturity levels.
Refer to the User's Guide for additional explanation of Steps 3, 4, and 5.
In addition to the “Overview for Chief Executive Officers and Boards of Directors”, the FFIEC has released the following documents to assist institutions with the Assessment.
​
  • Appendix A: Mapping Baseline Statements to FFIEC IT Handbook (Update May 2017)
 
  • Appendix B: Mapping to NIST Cyber Security Framework​ 







Picture
PLEASE REFER TO OUR LIST OF OUR SERVICES.  YOU CAN PLACE YOUR REQUEST FOR ENGAGEMENT THROUGH OUR
LOG IN/ REGISTER (ABOVE), OR YOU CAN SEND US A MESSAGE THROUGH EMAIL SO THAT WE CAN FURTHER DISCUSS YOUR SPECIFIC NEEDS.  WE LOOK FORWARD TO BUILDING A PRODUCTIVE RELATIONSHIP WITH YOUR INSTITUTION, AS
​YOUR INSTITUTION'S STRENGTH IS OUR STRENGTH! 


Privacy, Indemnification, and Code of Ethics

     
​
31 West 34th Street, 8th Floor, New York, New York 10001 USA *
​Telephone: (646) 668 5520; (646) 220 9279;  or Direct (917) 325 1930 
  • HOME
  • TEAM
    • CAREER >
      • Career Opportunities
  • SERVICES
    • REGULATORY ADVISORY
    • CYBERSECURITY >
      • How JWIC can help? >
        • 23 NYCRR PART 500 Q&A
        • 23 NYCRR PART 500
        • FFIEC CYBER SECURITY ASSESSMENT TOOL
    • ANTI-MONEY LAUNDERING >
      • Model Validation
      • AML/BSA, OFAC Compliance >
        • Pillar 1 - Compliance - Board Approved Compliance Program
        • Pillar 2 - BSA/AML/TF Compliance Training
        • Pillar 3 - BSA Officer - Day-to-day monitoring
        • Pillar 4 - Compliance Audit
        • Pillar 5 - KYC - Monnitoring - Beneficial OwnershipCompliance
        • - Special Look-back Investigation -Compliance
        • One Platform AML Documentation Interface Implementation
    • RISK MANAGEMENT >
      • Operations
    • OUTSOURCING SERVICES
  • Contact
  • PORTAL
    • Consultants sign - in
  • Links