Loading...

Using Your BIA and Data Flow Diagrams to Understand Risk

We'll dive in and look at building a valuable DFD. You’ll find an answer to the question “where does my data go when it leaves my network, and how is that data being protected?”

OnDemand
Recorded Wednesday,
December 15th, 2021
Presented by Cole Ponto
1h 30m total length
$279.00 or 1 Token

Includes: 30 Days OnDemand Playback, Presenter Materials and Handouts

  • Auditing
  • Information Technology/Security
  • Risk Management/Legal
  • Board Member
  • Compliance Officer
  • Internal Auditor
  • IT Professional
  • Privacy Officer/Information Security Professional
  • Risk Manager
  • Security Officer
  • Senior Management

Save on annual training costs with our Webinar Subscription Service and share webinars across your entire organization.

Become a subscriber

Learn about upcoming events, webinars and discounts.

Sign Up For Email Notifications

Data Flow Diagrams (DFDs) are one of the areas we see financial institutions struggle with the most. When performed as a compliance exercise (DFD’s are the top FFIEC CAT control that organizations aren’t completing), a DFD often looks like a Network Diagram and has little value.

But when we dive in and look at building a valuable DFD, you’ll find an answer to the question “where does my data go when it leaves my network, and how is that data being protected?”

What You'll Learn

  • Regulatory Guidance on Data Flow Diagrams
  • How do you get real value from a DFD?
  • Starting with your Business Impact Analysis
  • How to build a Data Flow Diagram that has value
  • Using your BIA and DFDs to understand your risk

Learn caption

Information Security Officer, IT Manager, Risk Officer, Internal Auditor, CIO, and Executives looking to understand the Cybersecurity Assessment process, common weaknesses in controls, and how to address them.


Cole Ponto

Instructor Bio

Cole Ponto is an Information Security Consultant with SBS Cybersecurity Institute. He is a Certified Banking Business Continuity Planner (CBBCP) Instructor, received his Bachelor of Science in Computer and Network Security from Dakota State University, and has three years of IT Auditing and Consulting experience.