The Bedel Security Blog
Information security expertise exclusively for you.
Sign Up Today
2 min read
The Risk Based Audit
We have a meeting every Monday morning to do a status update on each of the 40 financial institutions we serve as their virtual Information Security...
2 min read
Self-Assessing Authentication & Access Risk
A little over a year ago, banking regulators released the “Authentication and Access to Financial Institution Services and Systems” guidance. Since...
1 min read
Effective User Access Reviews
What exactly is a user access review? In its simplest form, this review is a process that certifies that users’ (including vendors’) access within...
3 min read
How to Change Your Virtual CISO (or how to avoid it to begin with)
There’s been an interesting trend in the virtual CISO industry over the last several months.
2 min read
Tools to Check Out in the Cybersecurity Resource Guide
Last week, we saw the Federal Financial Institutions Council (FFIEC) announce an update to its Cybersecurity Resource Guide. It was originally...
1 min read
Preparing for a Security Incident
The worst time to develop an Incident Response Plan for dealing with a security incident is during an actual incident. It’s not a matter of “if” but...
2 min read
5 Lessons I Learned From Interviewing A Crypto Expert
Last week, I had the chance to interview Wes Spencer, from FifthWall Solutions, on cryptocurrency in community banking. We’ve had so much good...
1 min read
Outsourcing IT
It’s common practice for financial institutions to outsource some or all of their Information Technology (IT) functions to a Managed Service Provider...