Blog

From Chaos to Control: How Incident Response Planning and Tabletop Exercises Can Save Your Bank

10.24.24 18:05 By Daniel Sitton - Comment(s)
From Chaos to Control: How Incident Response Planning and Tabletop Exercises Can Save Your Bank

The reality is, many banks and credit unions operate with a false sense of security. They may have robust firewalls, advanced detection systems, and even a dedicated IT team. But when it comes to responding to a cyber incident—whether it's a ransomware attack, data breach, or system compromise—most ...

The FFIEC CAT is Retiring; Is Your Bank Ready for What’s Next?

10.20.24 15:48 By Daniel Sitton - Comment(s)
The FFIEC CAT is Retiring; Is Your Bank Ready for What’s Next?
Learn how to prepare for the retirement of the FFIEC CAT and ensure your bank’s cybersecurity readiness with expert insights from Guardian Technology Group.

Bigger, Faster, Stronger: Process Improvement in Financial Services with 4 Examples

10.10.24 08:34 By Daniel Sitton - Comment(s)
Bigger, Faster, Stronger: Process Improvement in Financial Services with 4 Examples

As the founder of Guardian Technology Group and with over 20 years of experience in banking cybersecurity, I’ve seen firsthand the critical importance of robust processes in ensuring operational efficiency, regulatory compliance, risk management and customer satisfaction.


Want to be the Hero?  W...

Creating Mature Policies and Processes with COBIT 2019 and the CMMI Framework

10.07.24 12:46 By Daniel Sitton - Comment(s)
Creating Mature Policies and Processes with COBIT 2019 and the CMMI Framework

Creating Effective Policies and Processes with COBIT 2019 and Gauging Process Maturity Using the CMMI Framework

In my 20 years in Banking IT and Cybersecurity making sure that our IT governance and management practices were effective, is critical to running a ...

What is a vCISO and How to Hire One?

09.22.24 15:02 By Daniel Sitton - Comment(s)
What is a vCISO and How to Hire One?

In an age where cyber threats are on the rise, organizations are increasingly recognizing the necessity for robust cybersecurity measures. However, not all have the resources or requirement for a full-time Chief Information Security Officer (CISO). This is where the Virtual Chief Information Securit...

Tags