What must be addressed in the written information security program? When must it be updated?
The program must change and be amended as the credit union’s operations change.
What are the three reporting requirements in Part 748?
What does NCUA require from credit unions in the event of a catastrophic act?
Must make and retain a record of the catastrophic act, including:
How should a credit union certify compliance with NCUA’s security program requirements?
The President/Managing Official must certify compliance with Part 748 annually.
What is the role of the credit union’s board in the information security program? What is their role with regard to IT oversight?
The credit union’s board of directors and senior management will
Board and senior management are responsible for overseeing the business continuity management process, including establishing and updating policies, allocating sufficient personnel and resources to implement those policies, ensuring the BCP is independently reviewed and approved annually, and ensuring the BCP is tested regularly and that those tests are reviewed.
What must be addressed in the response program for unauthorized access to member information? When does the response program apply? Is member notice required? If so, what must be included in the notice?
WHAT. Assess the nature and scope of an incident to identify what member information has been accessed and the extent of the breach.
WHEN. When the credit union becomes aware of an incident, it should conduct an investigation to determine the severity and why members have potentially been impacted
Member Notification Required? Notification is only required where misuse of the information has already occurred or is reasonably possible. Notice must include:
What is the structure and purpose of the FFIEC Cybersecurity Assessment Tool?
The Assessment consists of two parts: Inherent Risk Profile and Cybersecurity Maturity.
Inherent Risk Profile - Identifies the inherent risk (before any controls or mitigations are in place) to the credit union’s operations by looking at its types of technologies and connections, delivery channels, online and mobile product offerings, organizational characteristics and the external threats experienced by the credit union.
Cybersecurity Maturity - Assesses the credit union’s controls and risk mitigations across five domains:
Are IT audits required? What is necessary for an IT audit to be valid?
Yes. Risk-based IT audit programs should: