The financial impact of severe cyber incidents in the banking sector quadrupled between 2017 and 2023 to an estimated $2.5 billion, according to a 2024 International Monetary Fund analysis of financial sector cybersecurity risks. For banks and credit unions, cybersecurity carries the weight of a defined regulatory obligation.

Cybersecurity risk management is the structured process institutions use to identify, assess, and respond to cyber threats in a way that satisfies examiner expectations and protects customers, systems, and data.

This guide covers the regulatory requirements that drive it, the frameworks financial institutions use, and how to build a program that holds up to scrutiny.

Examiners are enforcing cybersecurity risk management for banks.

Cybersecurity Risk vs. IT Risk

The two disciplines overlap significantly, but they are not identical.

IT risk management covers the full landscape of technology-related risks. This includes:

  • System outages
  • Data integrity failures
  • Vendor software defects
  • Disaster recovery

Cybersecurity risk management is narrower and focuses on threats originating from deliberate human actors, including:

  • Ransomware groups
  • State-sponsored attackers
  • Phishing campaigns
  • Insider threats

Understanding this distinction helps institutions structure their risk assessments for banks without leaving gaps between the two functions.

Why Banks Must Have a Cybersecurity Risk Management Program

Financial institutions operate under several overlapping regulatory frameworks that require formal cybersecurity programs as enforceable obligations.

The Gramm-Leach-Bliley Act Safeguards Rule establishes the baseline. Under GLBA, every covered financial institution must maintain a written information security program that includes a risk assessment, designated information security personnel, technical safeguards, and regular testing.

Five federal agencies (the OCC, FDIC, Federal Reserve, NCUA, and CFPB) constitute the FFIEC, which has issued extensive interagency guidance on cybersecurity governance. The OCC’s 2025 Cybersecurity and Financial System Resilience Report identified ransomware, third-party concentrations, and cloud security risks as top supervisory focus areas.

For credit unions, the NCUA has parallel requirements. NCUA examinations assess cybersecurity governance, risk assessment completeness, and incident response readiness. Institutions chartered in New York are also subject to NYDFS Cybersecurity Regulation Part 500, which includes specific requirements for:

  • Incident reporting timelines
  • Board reporting
  • Annual cybersecurity certifications

Major Cybersecurity Frameworks for Financial Institutions

Since the FFIEC retired its Cybersecurity Assessment Tool in August 2025, the framework landscape for bank cybersecurity programs has consolidated around a smaller set of recognised standards.

NIST Cybersecurity Framework 2.0 is the most widely referenced baseline. Published by the National Institute of Standards and Technology in February 2024, CSF 2.0 organises cybersecurity activities into six core functions:

  • Govern
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

The addition of Govern as a standalone function reflects regulators’ growing emphasis on board-level accountability as a foundation of a credible program. CSF 2.0 is voluntary guidance, not a regulatory requirement. However, FFIEC examiners frequently reference it, and many institutions use it as a program baseline.

The FFIEC Cybersecurity Assessment Tool Sunset (August 2025)

The FFIEC CAT was the de facto examination reference for banks and credit unions for nearly a decade before its retirement in August 2025. The recommended successors are NIST CSF 2.0 and the CRI Profile maintained by the Cyber Risk Institute. Institutions transitioning from the CAT are expected to document their framework selection and demonstrate how it maps to regulatory expectations.

GLBA’s Safeguards Rule remains the compliance floor. Framework selection should be proportionate to the institution’s size and complexity. A $300 million community bank and a $50 billion regional institution will apply NIST CSF 2.0 very differently.

Core Components of a Cybersecurity Risk Management Program

Regardless of which framework an institution selects, a credible bank information security program includes the same functional components.

Governance

This establishes who is responsible for cybersecurity decisions, how risks are reported to the board, and how cybersecurity strategy connects to the institution’s overall risk appetite.

Risk Identification and Risk Assessment

The institution first builds a current inventory of information assets and maps that inventory to the relevant threat landscape. Each identified threat is then scored by likelihood and potential impact, producing a residual risk picture after existing controls are applied.

Controls Implementation

This translates the risk assessment into specific mitigations, mapped to a recognised framework and categorised as preventive, detective, or corrective.

Continuous Monitoring and Incident Response

Automated alerting, log management, and periodic control testing keep the risk picture current between formal assessments.

  • Escalation procedures
  • Internal communication
  • Customer notification protocols
  • Regulatory reporting timelines

Cyber Threats Facing Banks and Credit Unions

Understanding the current threat landscape is a prerequisite for a meaningful risk assessment. Financial institutions face a concentrated set of threat types:

  • Ransomware (highest-impact threat category for financial institutions)
  • Phishing (primary initial access vector for credential theft)
  • Supply chain and third-party attacks
  • DDoS attacks
  • Insider threats (from employees, contractors, or inadvertent human error)

Understanding how security breaches occur in banks can help prioritise which threats warrant the most attention.

Third-Party Cyber Risk Management for Banks

Third-party relationships are one of the most significant sources of cybersecurity exposure for financial institutions. Banks and credit unions rely on vendors for core processing, payment services, data analytics, and other functions.

The OCC, FDIC, and Federal Reserve issued final Interagency Guidance on Third-Party Relationships: Risk Management in June 2023, replacing prior agency-specific guidance with a unified framework.

The guidance requires financial institutions to conduct due diligence before entering third-party relationships involving significant risk, and to maintain ongoing monitoring throughout the relationship.

Tiering Vendors by Risk

Not all vendors require the same level of oversight. Institutions tier vendors by criticality. Risk tiering should be documented and reviewed periodically, particularly when a vendor’s role changes.

Integrating cybersecurity requirements directly into vendor contracts at the onboarding stage reduces remediation friction later. Institutions building a structured third-party risk management program typically find that cybersecurity requirements fit naturally into the existing vendor lifecycle framework.

How to Implement a Cybersecurity Risk Management Program

The sequence matters. Institutions that implement controls before completing a risk assessment often find their programs over-engineered in low-risk areas and missing coverage in high-risk ones.

1. Establish governance

Assign an executive sponsor, define board reporting structure and frequency, and document roles.

2. Inventory assets and map critical systems

Produce a current inventory of hardware, software, data stores, third-party connections, and cloud environments.

3. Select a framework

Choose NIST CSF 2.0, the CRI Profile, or another recognised baseline.

4. Conduct a cybersecurity risk assessment

Identify threats, score likelihood and impact, calculate residual risk, and document methodology.

5. Map and implement controls

Identify gaps from the risk assessment, prioritise by risk score, and map implemented controls to the selected framework.

4. Build incident response procedures

Document the plan, assign roles, include regulatory notification timelines, and test annually.

7. Set a monitoring cadence

Define how controls are tested, logs reviewed, and vulnerabilities tracked.

Frequently Asked Questions

Which framework should a community bank use for cybersecurity?

NIST CSF 2.0 is the most widely used starting point and is broadly acceptable to examiners across the OCC, FDIC, Federal Reserve, and NCUA. Community banks often find the CRI Profile particularly useful because it maps NIST CSF 2.0 to FFIEC, GLBA, and regulatory examination expectations through 318 diagnostic statements. Framework selection should be proportionate to the institution’s size, complexity, and risk profile.

What replaced the FFIEC Cybersecurity Assessment Tool?

The FFIEC retired the CAT in August 2025. The FFIEC indicated that NIST CSF 2.0 and the CRI Profile are among the appropriate successors. Institutions are expected to document their framework transition, selecting a replacement that aligns to their complexity and demonstrating how it satisfies the regulatory expectations the CAT previously addressed.

How often should a bank conduct a cybersecurity risk assessment?

Most regulatory guidance calls for at least an annual cybersecurity risk assessment. Institutions should also conduct additional reviews when significant technology changes occur, when new products are launched, after a confirmed security incident, or when material changes to the vendor landscape alter the institution’s risk profile. The frequency should be documented in the institution’s information security policy.

Does cybersecurity risk management apply to credit unions?

Yes. Credit unions are subject to NCUA regulations requiring information security programs aligned with GLBA requirements. NCUA examinations assess cybersecurity governance, risk assessment completeness, and incident response readiness. The CRI Profile is directly applicable to credit unions navigating the FFIEC CAT transition.

Institutions that have addressed internal cybersecurity risk often find third-party relationships represent the next significant exposure. Extending the same risk management discipline to the vendor supply chain is a natural continuation of that work.

Platforms such as Predict360 include third-party risk modules that integrate cybersecurity requirements into the vendor lifecycle, though the program design principles described here apply regardless of which tools an institution uses.

AI-Powered Solution Join Our Newsletter

Stay informed about the latest in compliance and risk management technology.

Sign Up
  • GRC Insights
  • Industry Updates
  • Product Information
  • Additional Resources