You would employ this security process to prevent login attempts from foreign locations.
Geolocation Blocking
Geo-blocking
Table-top exercises are a valuable component of this required policy.
Business Continuity Plan
BCP
The NCUA has created this toolbox for federally insured credit unions to use when evaluating their levels of cybersecurity preparedness.
Automated Cybersecurity Evaluation Toolbox (ACET)
Multi-factor authentication, periodic penetration testing, and security awareness training are all requirements under updates to this Act.
Gramm-Leach-Bliley Act
GLBA
A table-top exercise is not complete until this process has been documented.
Post Mortem
The NCUA's security program requirements are outlined in this CFR part.
12 CFR Part 748: Security Program
NCUA Letter 22-RISK-01, published just yesterday, addressed a heightened risk of this cyber-related event due to current geopolitical events.
Social Engineering
Phishing Attacks
Testing to ensure members can continue banking verses testing to ensure branch/facility integrity is a key distinction between business continuity planning and this.
Disaster Recovery
Identify, Protect, Detect, Respond and Recover are components of a Framework of Cybersecurity Functions promulgated by this government entity.
National Institute of Standards and Technology (NIST)