What does an Appendix B doing?
VRM, VRM, VRMMMMM
Does this Phishing Network?
Risky Business
Controlling Interest
100

Appendix B to 12 CFR 30 establishes these.

What are the Interagency Guidelines Establishing Information Security Standards?

100

Interagency Guidance on Risk Management

 

What is OCC BULLETIN 2023-17?

100

What are the three key aspects of information security - abbreviated CIA

What are confidentiality, integrity, and availability?

100

This worksheet helps bank examiners determine the operational risk of a bank and can be found in the community bank supervision handbook.

What is the Operational RAS worksheet?

100

This individual is typically responsible for information security at a bank.

Who is the CISO or CIO?

200

Under Appendix B Part III, this subsection (a,b,c,d,e,f, or g) describes expectations for how a bank will Manage and Control Risk.

What is part III.C?

200

This committee typically oversees third party relationships at most community banks.

Who/What is the IT Steering Committee

200

A Phishing email is this type of attack vector.

What is social engineering?

200

This plan describes how a bank will recover from a cyber attack. 

What is an incident response plan?

200

This describes how a bank will maintain appropriate network and cybersecurity and improve its program each year and aligns with the enterprise one of these.

What is a strategic plan?

300

This security audit report is typically reviewed by bank management to monitor how effectively a vendor is maintaining cyber and information security controls.

What is a SOC2?

300

This phase of the third party risk management lifecycle precedes the due diligence phase.

What is Planning?

300

This type of malware does not replicate itself in other software, and does not require a 'host' application.

What is a computer worm?

300

This type of assessment helps a bank prioritize restoration and set recovery objectives, and is a precursor to establishing and testing a BCP.

What is a business impact analysis?

300

This individual is the East/Northeast IT Lead Expert

Who is Ryan MacDonald?
400

Under Appendix B Part III, this subsection (a,b,c,d,e,f, or g) describes expectations for Board Reporting on Information Security

What is part III.F?

400

This bulletin communicates the Third-Party Relationships: Supplemental Examination Procedures.

What is OCC Bulletin 2017-7?

400

This type of cybersecurity process or control deals with the remediation of vulnerabilities.

What is patch management?

400

These attacks overwhelm a bank’s network or services, rendering them unavailable to legitimate users, and are often used to mask other types of cyber attacks, such as a ransomware event.

What is Distributed Denial of Service or DDoS attacks?

400

This group is ultimately responsible for the risk and direction of the bank, including setting the tone and approving the information security program at a bank.

Who is the Board of Directors?

500

This supplement to Appendix B to Part 30—Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice 

What is Supplement A?

500

This GLBA provision requires proper oversight of service providers.

What is 12 CFR Appendix-B-to-Part-30 III.D.? - Remember, see your vendors in 3D!

500

This type of control testing is conducted by an ethical hacker, and is typically performed at least annually.

What is a penetration test?

500

These types of users, if not managed appropriately, present the highest risk to an organization?

Who are administrators or privileged account users?

500

This individual is the Chief Information Officer and Chief Data Officer at the OCC

Kristen Baldwin