No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
    • Upcoming
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

What FDIC’s Cyber Overhaul Means for FIs of All Sizes

New thresholds signal a broader shift toward stronger governance across the banking sector

by Jessica Caballero
October 29, 2024
in Cybersecurity, Financial Services
fdic building sign

Standards for how financial institutions (FIs) manage cybersecurity risks are tightening, with a pending new FDIC rule lowering the applicable size threshold for covered FIs. Jessica Caballero, director of cyber risk management at Defensestorm, takes a closer look at the FDIC’s new rules and what institutions of all sizes should know about their cyber risk approach.

The standards for proper governance and risk management within financial institutions continue to evolve, with the FDIC weighing whether to finalize a proposed rule to heighten standards for large banks, requiring those with assets over $10 billion to assess their risk governance, including cybersecurity risk management policies, controls, and data and systems infrastructure, among other risk- and governance-related requirements.

The Office of the Comptroller of the Currency (OCC) and the Federal Reserve have similar heightened standards that apply to significantly larger and often more complex banks — those with total assets over $50 billion. Considering the substantially lower scope of application threshold, the FDIC’s rewrite of the guidelines is catching the industry’s attention. It’s also catching the ire of opponents; Senate Republicans have called for the FDIC to withdraw the proposed rule, which saw its public comment period close in February 2024, so the future of the rule could be in doubt.

Regardless of whether the proposed rule becomes final, its implications should be examined and taken into consideration, particularly with regard to its cybersecurity components. 

Ultimately, better governance structures and well-implemented risk management principles are key for institutions working toward maturing their cyber risk management programs. The proposed rule can serve as an outline of best practices even for those institutions not covered under its scope — such as smaller banks and credit unions of all sizes — as it creates a new precedent that could very likely continue to trickle down to other asset sizes and institution types.

Boards increasingly need cyber expertise

The FDIC isn’t the first to make a move to evolve standards towards considering expertise as part of board composition and diversity strategies. The New York Department of Financial Services (NYDFS) 500 2023 amendment calls for the governing body to sufficiently understand cybersecurity matters to exercise oversight. The rule states that without such understanding, the use of advisers may be necessary to properly govern.

The FDIC’s proposed rule is not cybersecurity-specific like Part 500; however, it calls for diversity in experience to prevent knowledge gaps. It is no secret that lacking knowledge and expertise around technology and cybersecurity at the board level has been an obstacle to properly governing cyber risk within banks and credit unions, especially smaller institutions. We can assume this is the motivation behind preventing knowledge gaps within an institution’s key governing body.

Banks and credit unions of all sizes should consider increasing their governing bodies’ knowledge and expertise in technology and cybersecurity. This can, of course, be achieved through the diversity of experience in the board’s composition; more tangible options for smaller, less complex institutions include more frequent board training and establishing focused committees for targeted oversight. 

digital collage illustrating concept of individual being investigated
Featured

NY to Finance Sector Leaders: Let’s Get Personal

by Elan Parra
October 9, 2024

New York officials have advised financial institutions in the state to more regularly investigate the “character and fitness” of top executives — before and after they’ve been hired. Elan Parra of Guidepost Solutions explores what this means and why leaders should become comfortable with enhanced scrutiny that may feel downright invasive.

Read moreDetails

3 lines of defense model

FDIC’s rule requires covered banks to formally implement the three lines of defense model. Many community banks and credit unions have yet to formalize this model. As previously highlighted, the asset for heightened standards is shrinking; thus, the writing on the wall is clear this will become an official standard for all institutions. It is already the unofficial standard.

The three lines of defense model calls for these three units to monitor and report adherence to the risk management program:

  • Front-line units (FLU), aka business units
  • Independent risk management (IRM), which is under the direction of the chief risk officer (CRO)
  • Internal audit (IA), which should be overseen by a chief audit officer (CAO) with unrestricted access to the board and its governing committees

There are many ways to implement this model, especially when considering cyber risk management. Institutions may have:

  • Chief information security officer (CISO) who acts as a business line leader and, thus, sits in the first line
  • CISO who is a risk manager and fits into the independent second line

Institutions can choose what best suits them based on their talent and organizational structure. However, the choice must create the appropriate independence and ensure effective risk management and oversight. For example, if your CISO is a front-line CISO, ensure IRM has the appropriate talent and knowledge to effectively oversee this officer’s risk-taking activities, author policies and conduct risk assessments within cyber and information security.  

Data aggregation & reporting

The FDIC’s proposed rule addresses how data is aggregated and reported as part of the risk management program. It specifically calls for policies, procedures and processes covering data aggregation and reporting. The design, implementation and maintenance of the data architecture and information technology infrastructure should support the institution’s risk aggregation and reporting needs during normal operations as well as during times of stress, such as a disaster or cyber event.

This can create a new layer of stress for information technology professionals, as they will likely own the implementation of these policies, procedures and processes. The responsibility lies on their department to maintain the accuracy and availability of risk data to facilitate prompt reporting on material risks, breaches of limits and concentrations of risk to relevant parties for risks across the entire institution, not just cyber risk.  

For institutions working to mature their risk management programs, data aggregation and reporting should be at the forefront of their strategic planning process. Regardless of whether an institution fits under the scope of the proposed rule, data architecture and IT infrastructure are coming under more scrutiny from regulators, and thus, area institutions should be focused on maturing, especially as it relates to supporting risk management programs.

Maturing internal audit units

Institutions subject to the FDIC’s heightened standards would be required to mature their third line of defense — internal audit — to ensure the effectiveness of their risk management programs. Maturation would entail complete and current risk registers and risk assessments for all businesses, products and functions. All audit plans — including information security audit plans — should be driven by the assessed risk.

The audit would be required to assess the adequacy of and compliance with policies, procedures and processes for both the first and second lines of defense. It is also responsible for assessing the design and effectiveness of the risk management program. Institutions of all sizes can examine their audit scopes to ensure that the risk management program is being assessed in the same way technical compliance with regulations and internal policy is assessed.

Audits are an opportunity to learn new best practices and get guidance on where the program(s) need to grow and evolve. Institutions with asset sizes below the heightened standards cutoff can benefit from using firms that also audit larger institutions that have risk management programs that align with the proposed guidelines. These firms can provide guidance and insight that will lead to better, more effective risk management programs.

There are actions required out of larger, more complex institutions that would not be appropriate or feasible for smaller institutions in light of resource constraints and other factors – like conducting a formal root cause analysis on each identified deficiency. While it may not be feasible to all, there is no harm in understanding the impact of a deficiency and how effective the resolution was – albeit more informally. Without these understandings, senior leadership may fail to properly communicate the true issue leaving governing bodies unable to properly oversee the program. As with anything discussed here, the depths and formalities should be commensurate with the bank or credit union’s size and complexity. 


Tags: Board of DirectorsCyber Risk
Previous Post

Focus on Cyber Resilience Fundamentals and Compliance Will Naturally Follow

Next Post

The Long Shadow of a Cyber Breach

Jessica Caballero

Jessica Caballero

Jessica Caballero CERP, CRCM is the director of cyber risk management at Defensestorm, a cyber risk assessment, governance, security and fraud software provider in the financial services industry.

Related Posts

risk board game

What’s Next on the Board’s Agenda? Geopolitics

by Robyn Bew
July 18, 2025

Research points to moves that are helping directors effectively govern in unstable environment

news roundup data grungy

Most Organizations Adopting AI Without Strategy as Risks Mount

by Staff and Wire Reports
July 11, 2025

Leading firms leverage AI across governance functions; privacy deletion requests surge 82%; employees struggle with AI-powered threats; payment system attacks...

risk reporting concepts

The ‘So What?’ Problem With Board Risk Reporting

by Jim DeLoach
June 24, 2025

10 modern principles for transforming risk communication from compliance exercise to strategic dialogue in uncertain times

board of directors meeting table

Before You Say Yes to That Board Seat: A Director’s Due Diligence Checklist

by Chase Cole and Sidney Edgar
June 24, 2025

Public company directors face scrutiny from Wall Street, Congress, the SEC and beyond — comprehensive preparation is essential for business...

Next Post
shadow of hand over keyboard

The Long Shadow of a Cyber Breach

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
    • Upcoming
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights