Assessment Chief PDF Details

Assessment chiefs play an important role in their districts by ensuring that all students receive a quality education. According to the National Assessment of Educational Progress (NAEP), assessment chiefs are responsible for designing and implementing assessments, as well as analyzing and using assessment data to improve student learning. In order to become an assessment chief, you need to have experience in assessment design and implementation, as well as data analysis. If you're interested in working in this field, read on to learn more about the requirements and responsibilities of this position.

In the list, there is some good information about the assessment chief. Before you decide to fill out the form, it's worth reading a little more about it.

QuestionAnswer
Form NameAssessment Chief
Form Length123 pages
Fillable?No
Fillable fields0
Avg. time to fill out30 min 45 sec
Other namesffiec tool, ffiec cybersecurity assessment tool pdf, cybersecurity assessment tool ffiec, cat tool ffiet

Form Preview Example

FFIEC Cybersecurity Assessment Tool

Overview for Chief Executive Officers and Boards of Directors

In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council1 (FFIEC) developed the Cybersecurity Assessment Tool (Assessment), on behalf of its members, to help institutions identify their risks and determine their cybersecurity preparedness. The Assessment provides a repeatable and measurable process for institutions to measure their cybersecurity preparedness over time. The Assessment incorporates cybersecurity-related principles from the FFIEC Information Technology (IT) Examination Handbook and regulatory guidance, and concepts from other industry standards, including the National Institute of Standards and Technology (NIST) Cybersecurity Framework.2

Benefits to the Institution

For institutions using the Assessment, management will be able to enhance their oversight and management of the institution’s cybersecurity by doing the following:

Identifying factors contributing to and determining the institution’s overall cyber risk.

Assessing the institution’s cybersecurity preparedness.

Evaluating whether the institution’s cybersecurity preparedness is aligned with its risks.

Determining risk management practices and controls that are needed or need enhancement and actions to be taken to achieve the desired state.

Informing risk management strategies.

CEO and Board of Directors

The role of the chief executive officer (CEO), with management’s support, may include the responsibility to do the following:

Develop a plan to conduct the Assessment.

Lead employee efforts during the Assessment to facilitate timely responses from across the institution.

Set the target state of cybersecurity preparedness that best aligns to the board of directors’ (board) stated (or approved) risk appetite.

Review, approve, and support plans to address risk management and control weaknesses.

Analyze and present results for executive oversight, including key stakeholders and the board, or an appropriate board committee.

1The FFIEC comprises the principals of the following: The Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, National Credit Union Administration, Office of the Comptroller of the Currency, Consumer Financial Protection Bureau, and State Liaison Committee.

2A mapping is available in Appendix B: Mapping Cybersecurity Assessment Tool to the NIST Cybersecurity Framework. NIST reviewed and provided input on the mapping to ensure consistency with Framework principles and to highlight the complementary nature of the two resources.

June 2015

1

FFIEC Cybersecurity Assessment Tool

Overview for CEOs and Boards of Directors

 

 

Oversee the performance of ongoing monitoring to remain nimble and agile in addressing evolving areas of cybersecurity risk.

Oversee changes to maintain or increase the desired cybersecurity preparedness.

The role of the board, or an appropriate board committee, may include the responsibility to do the following:

Engage management in establishing the institution’s vision, risk appetite, and overall strategic direction.

Approve plans to use the Assessment.

Review management’s analysis of the Assessment results, inclusive of any reviews or opinions on the results issued by independent risk management or internal audit functions regarding those results.

Review management’s determination of whether the institution’s cybersecurity preparedness is aligned with its risks.

Review and approve plans to address any risk management or control weaknesses.

Review the results of management’s ongoing monitoring of the institution’s exposure to and preparedness for cyber threats.

Assessment’s Parts and Process

The Assessment consists of two parts: Inherent Risk Profile and Cybersecurity Maturity. Upon completion of both parts, management can evaluate whether the institution’s inherent risk and preparedness are aligned.

Inherent Risk Profile

Cybersecurity inherent risk is the level of risk posed to the institution by the following:

Technologies and Connection Types

Delivery Channels

Online/Mobile Products and Technology Services

Organizational Characteristics

External Threats

Inherent risk incorporates the type, volume, and complexity of the institution’s operations and threats directed at the institution. Inherent risk does not include mitigating controls. The Inherent Risk Profile includes descriptions of activities across risk categories with definitions for the least to most levels of inherent risk. The profile helps management determine exposure to risk that the institution’s activities, services, and products individually and collectively pose to the institution.

Least

Minimal

Moderate

Significant

Most Inherent

Inherent Risk

Inherent Risk

Inherent Risk

Inherent Risk

Risk

When each of the activities, services, and products are assessed, management can review the results and determine the institution’s overall inherent risk profile.

June 2015

2

FFIEC Cybersecurity Assessment ToolOverview for CEOs and Boards of Directors

Cybersecurity Maturity

The Assessment’s second part is Cybersecurity Maturity, designed to help management measure

the institution’s level of risk and corresponding controls. The levels range from baseline to

innovative. Cybersecurity Maturity includes

 

statements to determine whether an institution’s

Innovative

behaviors, practices, and processes can support

 

cybersecurity preparedness within the following

Advanced

five domains:

 

Cyber Risk Management and Oversight

Intermediate

Threat Intelligence and Collaboration

 

Cybersecurity Controls

Evolving

External Dependency Management

 

Cyber Incident Management and Resilience

The domains include assessment factors and

Baseline

contributing components. Within each

 

component, declarative statements describe

 

activities supporting the assessment factor at each

 

maturity level. Management determines which declarative statements best fit the current practices of the institution. All declarative statements in each maturity level, and previous levels, must be attained and sustained to achieve that domain’s maturity level. While management can determine the institution’s maturity level in each domain, the Assessment is not designed to identify an overall cybersecurity maturity level. The figure below provides the five domains and assessment factors.

Domain 1: Cyber

Domain 2: Threat

Risk Management

 

Intelligence &

 

 

& Oversight

 

Collaboration

 

 

Governance

 

 

Threat

 

 

 

 

Intelligence

 

 

 

 

 

 

 

Risk

 

 

Monitoring and

 

 

Management

 

 

Analyzing

Domain 3:

Cybersecurity

Controls

Preventative

Controls

Detective

Controls

 

Domain 4:

 

Domain 5: Cyber

 

External

 

 

Incident Management

Dependency

 

and Resilience

Management

 

 

 

 

 

 

 

 

Incident

 

 

 

 

 

Connections

 

 

Resilience

 

 

 

Planning and

 

 

 

 

 

 

 

 

Strategy

 

Relationship

 

 

Detection,

 

 

 

Response, and

 

Management

 

 

 

 

 

Mitigation

 

 

 

 

Resources

Information

Sharing

Corrective

Controls

Escalation and

Reporting

Training and

Culture

June 2015

3

FFIEC Cybersecurity Assessment Tool

Overview for CEOs and Boards of Directors

 

 

Management can review the institution’s Inherent Risk Profile in relation to its Cybersecurity Maturity results for each domain to understand whether they are aligned. The following table depicts the relationship between an institution’s Inherent Risk Profile and its domain Maturity Levels, as there is no single expected level for an institution. In general, as inherent risk rises, an institution’s maturity levels should increase. An institution’s inherent risk profile and maturity levels will change over time as threats, vulnerabilities, and operational environments change. Thus, management should consider reevaluating the institution’s inherent risk profile and cybersecurity maturity periodically and when planned changes can affect its inherent risk profile (e.g., launching new products or services, new connections).

Risk/Maturity

Inherent Risk Levels

 

Relationship

 

 

 

 

 

 

Least

Minimal

Moderate

Significant

Most

Cybersecurity Maturity Level for

 

Innovative

 

 

 

 

Each Domain

Advanced

 

 

 

 

Intermediate

 

 

 

 

Evolving

 

 

 

 

Baseline

 

 

 

 

 

 

 

 

 

 

Management can then decide what actions are needed either to affect the inherent risk profile or to achieve a desired state of maturity. On an ongoing basis, management may use the Assessment to identify changes to the institution’s inherent risk profile when new threats arise or when considering changes to the business strategy, such as expanding operations, offering new products and services, or entering into new third-party relationships that support critical activities. Consequently, management can determine whether additional risk management practices or controls are needed to maintain or augment the institution’s cybersecurity maturity.

Supporting Implementation

An essential part of implementing the Assessment is to validate the institution’s process and findings and the effectiveness and sufficiency of the plans to address any identified weaknesses. The next section provides some questions to assist management and the board when using the Assessment.

Assess

maturity and inherent risk

Reevaluate

Identify gaps

in alignment

 

Cybersecurity Management &

Oversight

What are the potential cyber threats to the

Implement

Determine

plans to

institution?

attain and

desired

state of

sustain

 

 

Is the institution a direct target of attacks?

maturity

maturity

 

 

 

Is the institution’s cybersecurity

preparedness receiving the appropriate level of time and attention from management and the board or an appropriate board committee?

June 2015

4

FFIEC Cybersecurity Assessment Tool

Overview for CEOs and Boards of Directors

 

 

Do the institution’s policies and procedures demonstrate management’s commitment to sustaining appropriate cybersecurity maturity levels?

What is the ongoing process for gathering, monitoring, analyzing, and reporting risks?

Who is accountable for assessing and managing the risks posed by changes to the business strategy or technology?

Are the accountable individuals empowered with the authority to carry out these responsibilities?

Do the inherent risk profile and cybersecurity maturity levels meet management’s business and risk management expectations? If there is misalignment, what are the proposed plans to bring them into alignment?

How can management and the board, or an appropriate board committee, make this process part of the institution’s enterprise-wide governance framework?

Inherent Risk Profile

What is the process for gathering and validating the information for the inherent risk profile and cybersecurity maturity?

How can management and the board, or an appropriate board committee, support improvements to the institution’s process for conducting the Assessment?

What do the results of the Assessment mean to the institution as it looks at its overall risk profile?

What are the institution’s areas of highest inherent risk?

Is management updating the institution’s inherent risk profile to reflect changes in activities, services, and products?

Cybersecurity Maturity

How effective are the institution’s risk management activities and controls identified in the Assessment?

Are there more efficient or effective means for attaining or improving the institution’s risk management and controls?

What third parties does the institution rely on to support critical activities?

What is the process to oversee third parties and understand their inherent risks and cybersecurity maturity?

How does management validate the type and volume of attacks?

Is the institution sharing threat information with peers, law enforcement, and critical third parties through information-sharing procedures?

Summary

FFIEC has developed the Assessment to assist management and the board, or an appropriate board committee, in assessing their institution’s cybersecurity preparedness and risk. For more information and additional questions to consider, refer to the FFIEC Cybersecurity Assessment General Observations on the FFIEC’s Web site.

June 2015

5

OMB Control 1557-0328

Expiration Date: December 31, 2015

FFIEC

Cybersecurity Assessment Tool

June 2015

FFIEC Cybersecurity Assessment Tool

Contents

Contents

 

Contents

i

User’s Guide

1

Overview

1

Background

2

Completing the Assessment

2

Part One: Inherent Risk Profile

3

Part Two: Cybersecurity Maturity

5

Interpreting and Analyzing Assessment Results

8

Resources

10

Inherent Risk Profile

11

Cybersecurity Maturity

19

Domain 1: Cyber Risk Management and Oversight

19

Domain 2: Threat Intelligence and Collaboration

30

Domain 3: Cybersecurity Controls

34

Domain 4: External Dependency Management

47

Domain 5: Cyber Incident Management and Resilience

51

Additional Resources

Overview for Chief Executive Officers and Boards of Directors

Appendix A: Mapping Baseline Statements to FFIEC IT Examination Handbook

Appendix B: Mapping Cybersecurity Assessment Tool to NIST Cybersecurity Framework

Appendix C: Glossary

June 2015

i

FFIEC Cybersecurity Assessment Tool

User’s Guide

User’s Guide

Overview

In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council1 (FFIEC) developed the Cybersecurity Assessment Tool (Assessment), on behalf of its members, to help institutions identify their risks and determine their cybersecurity maturity.

The content of the Assessment is consistent with the principles of the FFIEC Information Technology Examination Handbook (IT Handbook) and the National Institute of Standards and Technology (NIST) Cybersecurity Framework,2 as well as industry accepted cybersecurity

practices. The Assessment provides institutions with a repeatable and measureable process to inform management of their institution’s risks and cybersecurity preparedness.

The Assessment consists of two parts: Inherent Risk Profile and Cybersecurity Maturity. The

Inherent Risk Profile identifies the institution’s inherent risk before implementing controls. The Cybersecurity Maturity includes domains, assessment factors, components, and individual

declarative statements across five maturity levels to identify specific controls and practices that are in place. While management can determine the institution’s maturity level in each domain,

the Assessment is not designed to identify an overall cybersecurity maturity level.

To complete the Assessment, management first assesses the institution’s inherent risk profile

based on five categories:

Technologies and Connection Types

Delivery Channels

Online/Mobile Products and Technology Services

Organizational Characteristics

External Threats

Management then evaluates the institution’s Cybersecurity Maturity level for each of five

domains:

Cyber Risk Management and Oversight

Threat Intelligence and Collaboration

Cybersecurity Controls

External Dependency Management

Cyber Incident Management and Resilience

1The FFIEC comprises the principals of the following: The Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, National Credit Union Administration, Office of the Comptroller of the Currency, Consumer Financial Protection Bureau, and State Liaison Committee.

2A mapping is available in Appendix B: Mapping Cybersecurity Assessment Tool to the NIST Cybersecurity Framework. NIST reviewed and provided input on the mapping to ensure consistency with Framework principles and to highlight the complementary nature of the two resources.

June 2015

1

FFIEC Cybersecurity Assessment Tool

User’s Guide

By reviewing both the institution’s inherent risk profile and maturity levels across the domains,

management can determine whether its maturity levels are appropriate in relation to its risk. If

not, the institution may take action either to reduce the level of risk or to increase the levels of maturity. This process is intended to complement, not replace, an institution’s risk management

process and cybersecurity program.

Background

The Assessment is based on the cybersecurity assessment that the FFIEC members piloted in

2014, which was designed to evaluate community institutions’ preparedness to mitigate cyber risks. NIST defines cybersecurity as “the process of protecting information by preventing, detecting, and responding to attacks.” As part of cybersecurity, institutions should consider

managing internal and external threats and vulnerabilities to protect infrastructure and information assets. The definition builds on information security as defined in FFIEC guidance.

Cyber incidents can have financial, operational, legal, and reputational impact. Recent high- profile cyber attacks demonstrate that cyber incidents can significantly affect capital and earnings. Costs may include forensic investigations, public relations campaigns, legal fees, consumer credit monitoring, and technology changes. As such, cybersecurity needs to be

integrated throughout an institution as part of enterprise-wide governance processes, information security, business continuity, and third-party risk management. For example, an institution’s

cybersecurity policies may be incorporated within the information security program. In addition, cybersecurity roles and processes referred to in the Assessment may be separate roles within the security group (or outsourced) or may be part of broader roles across the institution.

Completing the Assessment

The Assessment is designed to provide a measurable and repeatable process to assess an institution’s level of cybersecurity risk and preparedness. Part one of this Assessment is the

Inherent Risk Profile, which identifies an institution’s inherent risk relevant to cyber risks. Part two is the Cybersecurity Maturity, which determines an institution’s current state of

cybersecurity preparedness represented by maturity levels across five domains. For this Assessment to be an effective risk management tool, an institution may want to complete it periodically and as significant operational and technological changes occur.

Cyber risk programs build upon and align existing information security, business continuity, and disaster recovery programs. The Assessment is intended to be used primarily on an enterprise- wide basis and when introducing new products and services as follows:

Enterprise-wide. Management may review the Inherent Risk Profile and the declarative statements to understand which policies, procedures, processes, and controls are in place enterprise-wide and where gaps may exist. Following this review, management can determine appropriate maturity levels for the institution in each domain or the target state for Cybersecurity Maturity. Management can then develop action plans for achieving the target state.

New products, services, or initiatives. Using the Assessment before launching a new product, service, or initiative can help management understand how these might affect the institution’s inherent risk profile and resulting desired maturity levels.

June 2015

2

FFIEC Cybersecurity Assessment Tool

User’s Guide

Part One: Inherent Risk Profile

Part one of the Assessment identifies the institution’s inherent risk. The Inherent Risk Profile identifies activities, services, and products organized in the following categories:

Technologies and Connection Types. Certain types of connections and technologies may pose a higher inherent risk depending on the complexity and maturity, connections, and nature of the specific technology products or services. This category includes the number of Internet service provider (ISP) and third-party connections, whether systems are hosted internally or outsourced, the number of unsecured connections, the use of wireless access, volume of network devices, end-of-life systems, extent of cloud services, and use of personal devices.

Delivery Channels. Various delivery channels for products and services may pose a higher inherent risk depending on the nature of the specific product or service offered. Inherent risk increases as the variety and number of delivery channels increases. This category addresses whether products and services are available through online and mobile delivery channels and the extent of automated teller machine (ATM) operations.

Online/Mobile Products and Technology Services. Different products and technology services offered by institutions may pose a higher inherent risk depending on the nature of the specific product or service offered. This category includes various payment services, such as debit and credit cards, person-to-person payments, originating automated clearing house (ACH), retail wire transfers, wholesale payments, merchant remote deposit capture, treasury services and clients and trust services, global remittances, correspondent banking, and merchant acquiring activities. This category also includes consideration of whether the institution provides technology services to other organizations.

Organizational Characteristics. This category considers organizational characteristics, such as mergers and acquisitions, number of direct employees and cybersecurity contractors, changes in security staffing, the number of users with privileged access, changes in information technology (IT) environment, locations of business presence, and locations of operations and data centers.

External Threats. The volume and type of attacks (attempted or successful) affect an institution’s inherent risk exposure. This category considers the volume and sophistication of the attacks targeting the institution.

Risk Levels

Risk Levels incorporate the type, volume, and complexity of the institution’s operations and

threats directed at the institution. Inherent risk does not include mitigating controls.

June 2015

3

How to Edit Assessment Chief Online for Free

This PDF editor was created with the intention of making it as simple and user-friendly as it can be. All of these steps will help make managing the ffiec assessment template easy and fast.

Step 1: The initial step is to click the orange "Get Form Now" button.

Step 2: You will find all the actions which you can use on the document as soon as you've accessed the ffiec assessment template editing page.

Prepare the ffiec assessment template PDF and enter the details for every single part:

cybersecurity assessment tool blanks to consider

Complete the The FFIEC comprises the, and June space using the data demanded by the program.

step 2 to entering details in cybersecurity assessment tool

Inside the segment dealing with FFIEC has developed the Assessment, and June, you will need to note down some essential particulars.

Finishing cybersecurity assessment tool part 3

The space Contents, and Contents i Users Guide Overview should be where to place all sides' rights and responsibilities.

Filling out cybersecurity assessment tool stage 4

Finish by checking all of these fields and filling out the proper data: Additional Resources Overview for, and June.

Completing cybersecurity assessment tool part 5

Step 3: Once you press the Done button, your ready form may be exported to all of your devices or to email specified by you.

Step 4: Ensure you keep away from upcoming difficulties by getting at least 2 duplicates of your document.

Watch Assessment Chief Video Instruction

Please rate Assessment Chief

1 Votes
If you believe this page is infringing on your copyright, please familiarize yourself with and follow our DMCA notice and takedown process - click here to proceed .