Please log-in to purchase.

Purchasing for others?

Learn How
Please log into your account at using your own credentials before adding programs to your cart. (If you don't have an account, you'll need to create one; if you have forgotten your password, you can reset it.)
If you'd like to purchase for someone else, or use a payment method associated with another employee, you'll be prompted for that information on a future screen – but please use only your own credentials when making the initial program selection.

Using Your BIA and Data Flow Diagrams to Understand Risk-Fa24


Additional information



Recording Available Until



Chad Knutson


SBS CyberSecurity

Target Audience

Information security officers, IT managers, risk officers

Program Time

10:00 am-11:30 am CT


90 minutes

Data Flow Diagrams (DFDs) are one of the areas financial institutions tend to struggle with quite often. When performed as a compliance exercise (DFD’s are the top FFIEC CAT control that institutions aren’t completing), a DFD often looks like a Network Diagram and has little value.

But when we dive in and look at building a valuable DFD, you’ll find an answer to the question “where does my data go when it leaves my network, and how is that data being protected?”

This presentation will cover the following areas/topics:

  • Regulatory Guidance on Data Flow Diagrams
  • How do you get real value from a DFD?
  • Starting with your Business Impact Analysis
  • How to build a Data Flow Diagram that has value
  • Using your BIA and DFDs to understand your risk

Target Audience:  Information security officers, IT managers, risk offi