Policy Writing Approach
Regional Bank has been growing rapidly. In the past two years, it has acquired six smaller financial institutions. The long-term strategic plan is for the bank to keep growing and to “go public” within the next three to five years. FDIC regulators have told management that they will not approve any additional acquisitions until the bank strengthens its information security program. The regulators commented that Regional Bank’s information security policy is confusing, lacking in structure, and filled with discrepancies.
You have been tasked with fixing the problems with the policy document. Write a two-page case study that includes the following sections.
• Introduction: Current Problem
• Discussion
• Where do you begin this project?
• Would you use any material from the original document?
• What other materials should you request?
• Would you want to interview the author of the original policy?
• Who else would you interview? Should the bank work toward ISO certification?
• Which ISO 27002:2022 domains and sections would you include?
• Should you use NIST’s Cybersecurity Framework (CIA security model) and related tools? If yes, explain why the tools selected are important to IS policy writing.
• Which methods of communication should you use to send the policy?
• What other criteria should you consider?
• Conclusion
Sample Answer
Case Study: Reconstructing Regional Bank’s Information Security Policy
Introduction: Current Problem
Regional Bank has experienced significant growth through the acquisition of six smaller financial institutions in the past two years. This rapid expansion, while strategically aligned with the bank’s long-term goal of going public within the next three to five years, has exposed critical weaknesses in its operational infrastructure, particularly its information security program. FDIC regulators have identified the bank’s existing information security policy as a major impediment to further growth, explicitly stating that no additional acquisitions will be approved until substantial improvements are made. The current policy document is characterized as confusing, lacking in structure, and riddled with discrepancies, indicating a fundamental failure to establish a clear and effective framework for safeguarding sensitive financial and customer data. This situation not only jeopardizes the bank’s acquisition strategy but also exposes it to potential regulatory fines, reputational damage, and security breaches, underscoring the urgent need for a comprehensive overhaul of its information security policy.