Using Your BIA and Data Flow Diagrams to Understand Risk

Posted by Laurie Okawa-Moore
on "November 23, 2021 1:33 pm"

Data Flow Diagrams (DFDs) are one of the areas we see financial institutions struggle with the most. When performed as a compliance exercise (DFD's are the top FFIEC CAT control that organizations aren't completing), a DFD often looks like a Network Diagram and has little value. But when we dive in and look at building a valuable DFD, you'll find an answer to the question "where does my data go when it leaves my network, and how is that data being protected?"

100520 new oncourse logo combo

Using Your BIA and Data Flow Diagrams to Understand Risk
Wednesday, December 15, 2021 • 6:00 am - 7:30 am HST (OnDemand playback is included)

Register Now

Covered Topics

  • Regulatory Guidance on Data Flow Diagrams
  • How do you get real value from a DFD?
  • Starting with your Business Impact Analysis
  • How to build a Data Flow Diagram that has value
  • Using your BIA and DFDs to understand your risk

Who Should Attend?

Information Security Officer, IT Manager, Risk Officer, Internal Auditor, CIO, and Executives looking to understand the Cybersecurity Assessment process, common weaknesses in controls, and how to address them.

About The Presenter

Cole Ponto is an Information Security Consultant with SBS Cybersecurity Institute. He is a Certified Banking Business Continuity Planner (CBBCP) Instructor, received his Bachelor of Science in Computer and Network Security from Dakota State University, and has three years of IT Auditing and Consulting experience.