Data Flow Diagrams (DFDs) are one of the areas we see financial institutions struggle with the most. When performed as a compliance exercise (DFD’s are the top FFIEC CAT control that organizations aren’t completing), a DFD often looks like a Network Diagram and has little value.
But when we dive in and look at building a valuable DFD, you’ll find an answer to the question “where does my data go when it leaves my network, and how is that data being protected?”
- Regulatory Guidance on Data Flow Diagrams
- How do you get real value from a DFD?
- Starting with your Business Impact Analysis
- How to build a Data Flow Diagram that has value
- Using your BIA and DFDs to understand your risk
Who Should Attend?
Information Security Officer, IT Manager, Risk Officer, Internal Auditor, CIO, and Executives looking to understand the Cybersecurity Assessment process, common weaknesses in controls, and how to address them.
Please note: This site employs features that may cause unexpected behavior in older versions of Internet Explorer. If you experience a problem, try refreshing your screen. If this doesn't solve the problem, click on this link.
You may contact us by using the Online Chat button below.