← Back to Case Studies
185
FTE Employees
7
Branch Locations
14
ATM Units
$620M
Total Assets
$28.4M
Annual Net Revenue
0
Dedicated CISO
6
IT Staff FTE

🏢 Organization Profile

1958
Year Founded
$620M
Total Assets
$28.4M
Net Revenue
7
Branch Locations

Background

Lakewood Community Bank (LCB) is an OCC-chartered national bank headquartered at 1450 Detroit Avenue, Lakewood, Ohio 44107. Founded in 1958 as Lakewood Savings & Loan, LCB converted to a national bank charter in 1994 and has grown organically to serve Cuyahoga County's western suburbs. LCB offers retail and small business checking and savings, consumer and commercial lending, residential mortgage origination, and digital banking services through a Q2 ebanking platform. The bank is FDIC-insured, a member of the Federal Home Loan Bank of Cincinnati, and participates in the Ohio Financial Institutions Cybersecurity Coalition (OFICC).

LCB is governed by an 11-member Board of Directors with a Bank Secrecy Act/AML Committee and an Audit Committee. The President & CEO reports to the Board. The bank employs 185 FTEs across retail, commercial, operations, and technology functions. Technology operations are managed by a CIO/IT Director, who also serves as the de facto Information Security Officer — LCB has no dedicated CISO. Cybersecurity responsibilities are shared informally between the IT Director (infrastructure/security tools), the Compliance Officer (GLBA/regulatory), and the Operations Manager (fraud/ACH).

Regulatory & Compliance Obligations

LCB operates under the GLBA Safeguards Rule (16 CFR Part 314, revised 2023) as a financial institution, requiring a written information security program with specific technical controls including encryption, MFA, and access controls. The FFIEC IT Examination Handbook and the FFIEC Cybersecurity Assessment Tool (CAT) guide examination expectations from the OCC. As a PCI DSS merchant and service provider for card processing, LCB is classified as a Level 4 merchant under Visa/Mastercard rules. FinCEN BSA/AML requirements apply to all transactions. OCC Heightened Standards (12 CFR Part 30, Appendix D) apply to front-line risk management. The 2023 GLBA updates added a 30-day breach notification requirement to the primary federal regulator.

AttributeDetail
Legal NameLakewood Community Bank (LCB)
CharterOCC National Bank Charter #22847
Headquarters1450 Detroit Avenue, Lakewood, OH 44107
ABA Routing Number042103889 (fictional)
FDIC Certificate58341 (fictional)
Founded1958 (as Lakewood Savings & Loan; converted to national bank charter 1994)
Total Assets (FY2024)$620 million
Total Deposits$548 million
Net Revenue (FY2024)$28.4 million
Tier 1 Capital Ratio11.2% (well-capitalized per OCC standards)
Primary RegulatorOffice of the Comptroller of the Currency (OCC)
Deposit InsuranceFDIC — insured to applicable limits
FFIEC CAT MaturityBaseline (self-assessed, 2023)
Information Security Staff1 IT Security Analyst (no dedicated CISO)
Annual IT Budget$1.8M (~6.3% of revenue); cybersecurity sub-line: $142K
Cyber Insurance$5M limit; AIG CyberEdge; last reviewed 2022
FS-ISAC MemberYes — participant since 2021; Alert subscriber

🏦 Branch Facilities & Service Territory

LCB operates seven branch locations plus two drive-through-only satellite windows in western Cuyahoga County. The main office (FAC-01) houses the data center, wire room, and IT operations. All branches connect to FAC-01 via AT&T MPLS (primary) with Comcast Business broadband (failover). Branch connectivity is managed through Cisco Meraki MX appliances at each location.

Facility IDLocationTypeATMsEmployeesNotes
FAC-011450 Detroit Ave, Lakewood (Main Office)Main Office + Branch2 Diebold Nixdorf62Data center, wire room, vault, IT ops
FAC-0212300 Madison Ave, LakewoodRetail Branch2 Diebold Nixdorf18Drive-through; high-traffic retail
FAC-0325000 Center Ridge Rd, WestlakeRetail Branch2 Diebold Nixdorf22New construction 2019; newest branch
FAC-044900 Rocky River Dr, ClevelandRetail Branch2 Diebold Nixdorf19Shared parking lot; older building
FAC-0514500 Pearl Rd, StrongsvilleRetail Branch2 Diebold Nixdorf21Isolated Meraki connectivity issue (unresolved 60 days)
FAC-065800 Turney Rd, Garfield HeightsRetail Branch1 Diebold Nixdorf17Lower-volume; 1 teller + platform staff
FAC-07800 Crocker Rd, WestlakeDrive-Through + Vault1 Diebold Nixdorf8Vault facility; limited IT footprint
DT-01Clague Rd & Westwood Dr, WestlakeDrive-Through Satellite0No on-site staff; Meraki camera only
DT-02W 117th St & Madison Ave, LakewoodDrive-Through Satellite0No on-site staff; camera monitored
Critical Finding — ATM End-of-Life: 9 of 14 ATMs (FAC-01 through FAC-05 and FAC-07) are Diebold Nixdorf DN200 units running Windows 7 Embedded (EOL January 2020). Diebold's extended support program for these units expired in Q3 2023. The three ATMs at FAC-03 and FAC-06 run Windows 10 IoT LTSC. Diebold has quoted $34,000 per unit for replacement — full fleet replacement would cost $306,000; budget has not been approved. These EOL ATMs connect to LCB's corporate LAN segment (not an isolated ATM network) and are managed via RealTime ATM Manager software on SRV-08.

👥 Organizational Structure & Staffing

Robert Halverson
President & CEO
Susan Park
CFO
David Reyes
COO / Operations Mgr
Kevin Merritt
CIO / IT Director
Patricia Greene
Chief Lending Officer
Angela Foster
Compliance & BSA Officer
IT Systems Admin (2 FTE)
Reports to Kevin Merritt
Help Desk (2 FTE)
Reports to Kevin Merritt
Jamie Walters
IT Security Analyst
Core Banking Admin (1 FTE)
Reports to Kevin Merritt
BSA/AML Analysts (2 FTE)
Reports to Angela Foster

DepartmentFTECybersecurity Role / Notes
Retail Banking (all branches)98End users; annual security awareness training required
Lending / Mortgage22Handle PII, SSN, financial data — high-risk users for data exposure
Operations / ACH / Wire14Wire transfer initiators — BEC risk; dual-control only partially enforced
Finance / Accounting9Access to general ledger, payroll systems
IT Department6One security analyst (Jamie Walters); no certifications (CISSP/CISM/Security+)
Compliance / BSA3GLBA program owner; FFIEC CAT custodian; Angela Foster leads
Executive / Admin6CEO/CFO have admin-level email — high phishing / BEC risk
HR4Access to employee PII, W-2 data, payroll accounts
Facilities / Physical Security8Physical security; camera systems not integrated with IT
Marketing5Manage social media, website CMS; limited IT access
TOTAL185
Governance Gap — No Dedicated CISO: LCB has no dedicated Chief Information Security Officer (CISO). Kevin Merritt (CIO/IT Director) manages all technology operations and serves informally as Information Security Officer. The sole security-focused staff member is Jamie Walters (IT Security Analyst), a 2-year employee with no formal cybersecurity certification (no CISSP, CISM, or Security+). The GLBA Safeguards Rule (2023) requires a "qualified individual" to oversee the information security program — the current dual-hat arrangement does not fully satisfy the rule's intent for a financial institution of LCB's complexity and asset size.

💻 Information Technology (IT) Assets

Servers & Core Infrastructure

Asset IDDescriptionOS / PlatformLocationStatus / Notes
SRV-01Jack Henry Silverlake Core Banking (Primary)Windows Server 2019FAC-01 Data CenterProduction — patched current; managed by Jack Henry remote support
SRV-02Jack Henry Silverlake Core Banking (DR/Failover)Windows Server 2019FAC-01 (isolated rack)DR not tested in 18 months; failover process undocumented
SRV-03Q2 ebanking Integration MiddlewareWindows Server 2016FAC-01 Data CenterServer 2016 mainstream support ended Oct 2025; patch lag ~4 months
SRV-04Microsoft Active Directory / DNS / DHCPWindows Server 2022FAC-01 Data CenterCurrent; manages 210 domain accounts
SRV-05Microsoft Exchange (on-prem email)Exchange Server 2016FAC-01 Data CenterExchange 2016 EOL October 2025; migration to M365 planned but unfunded
SRV-06File Server / Branch Shared DrivesWindows Server 2019FAC-01 Data CenterNo DLP controls; contains loan application PII and financial records
SRV-07Backup Server (Veeam B&R 12)Windows Server 2022FAC-01 Data CenterBackup integrity not tested since March 2024; offsite copy to Iron Mountain weekly
SRV-08RealTime ATM ManagerWindows Server 2016FAC-01 Data CenterATM management server on corporate LAN — not isolated; EOL OS
SRV-09Fiserv CheckFree ACH ProcessingSaaS / Cloud (Fiserv-hosted)CloudFiserv-managed; SOC 2 Type II
SRV-10Symitar Episys (Credit Union Division — legacy)IBM iSeries AS/400FAC-01 Data CenterLegacy platform from 2004 credit union merger; decommission delayed 3 years

Workstations & End-User Devices

TypeCountOSNotes
Branch Teller Workstations68Windows 10 Pro (mixed build versions)14 stations running build 21H1 (unsupported); MECM patching deployed but 22% non-compliant
Lending Officer Laptops22Windows 11 ProCurrent; BitLocker enabled; CrowdStrike agent installed
Operations / Wire Room Workstations8Windows 10 ProWire transfer terminals — no MFA on Jack Henry Silverlake access
IT Staff Workstations6Windows 11 ProAdmin systems; CrowdStrike + SentinelOne (pilot)
Executive Laptops6Windows 11 Pro / MacBook ProCEO and CFO use personal Apple iCloud accounts for some document storage
ATM Units (Windows 10 IoT)5Windows 10 IoT LTSC 2021FAC-03 (2 units), FAC-06 (1 unit), FAC-07 (2 units) — current patching
ATM Units (Windows 7 EOL)9Windows 7 Embedded (EOL)EOL Jan 2020; extended Diebold support expired Q3 2023; on corporate LAN (VLAN 1)

Business Applications

ApplicationVendorFunctionRisk Note
Silverlake Core BankingJack Henry & AssociatesCore deposits, loans, GLRemote admin access for Jack Henry support — access not time-limited; persistent VPN
Q2 ebankingQ2 Holdings (SaaS)Online / mobile banking (22,400 customers)OAuth integration reviewed annually; Q2 SOC 2 Type II current; customer MFA optional only
Fiserv CheckFreeFiserv (SaaS)ACH origination / receivingSOC 2 Type II; dual-control enforced by Fiserv platform
RealTime ATM ManagerCrane Payment InnovationsATM fleet managementAdmin console on corporate LAN; last security review 2020
Encompass (ICE Mortgage)ICE Mortgage Technology (SaaS)Mortgage originationStores SSN, income data; MFA not enforced for all users; external broker access
Jack Henry JHA PayCenterJack Henry (SaaS)Debit/credit card processingPCI DSS compliant per Visa/MC registry; QSA attestation 2023
Microsoft 365 (Business Premium)MicrosoftEmail, Teams, SharePointMFA enforced for IT/exec only; 140 branch staff accounts without MFA
Kronos Workforce ReadyUKG (SaaS)HR / PayrollContains SSN, bank account data for all employees; MFA not enforced
Nessus EssentialsTenableVulnerability scanningFree version — no authenticated scanning; last scan 90 days ago; ATMs never scanned
EventLog AnalyzerManageEngineLog management / basic SIEMCovers AD and firewall only; ATM logs, core banking logs not ingested; 1,400+ unreviewed alerts

💳 Core Banking, Payment Systems & ATM Infrastructure

LCB's payment and core banking infrastructure represents the highest-criticality technology environment — equivalent to OT/ICS systems in industrial sectors. Compromise of core banking, ACH origination, or wire transfer systems directly impacts customer funds, regulatory standing, and the bank's ability to continue operations. Unlike industrial OT systems, attacks on financial infrastructure can result in near-immediate, irreversible monetary loss.

SystemPlatformFunctionConnectivitySecurity Notes
Jack Henry Silverlake On-prem Windows Server 2019 Core deposits, loans, GL, teller Internal LAN (VLAN 10) + Jack Henry VPN for remote support No MFA for teller access; Jack Henry support VPN persistent (always-on)
ACH Origination Fiserv CheckFree (SaaS) ACH batches — payroll, bill pay, transfers Internet via encrypted HTTPS; Fiserv-managed Dual-control enforced; Fiserv-managed security; SOC 2 Type II
Wire Transfer System Silverlake Wire Module + manual process Domestic wire transfers (avg $4.2M/day) Internal LAN (VLAN 10) Dual-control inconsistent — 3 of 8 high-value wires in Q4 2024 processed by single operator; no callback verification for new payees
Debit/ATM Card Processing JHA PayCenter (SaaS) Debit card authorization, ATM switching Internet via encrypted API; JHA-managed PCI DSS compliant; QSA attestation current
ATM Cash Management RealTime ATM Manager (on-prem) ATM monitoring, cash forecasting, remote control Corporate LAN (VLAN 1 — flat) ATM management on flat corporate network; no dedicated ATM VLAN; SRV-08 on VLAN 1
Online/Mobile Banking Q2 ebanking (SaaS) Customer-facing digital banking (22,400 users) Internet-facing; Q2-hosted Q2 WAF in place; customer MFA = optional (not enforced); 31% of users have MFA disabled
Mortgage Origination Encompass ICE (SaaS) Loan origination, docs, closings Internet HTTPS; ICE-managed Contains SSN, income data; 6 external realtors/brokers have access — no security review conducted
Correspondent Banking FHLB Cincinnati + 2 correspondents Large-dollar transfers, liquidity FHLB-secure portal FHLB access credentials managed by CFO only — no succession plan; MFA enforced by FHLB portal
Critical Finding — Wire Transfer Fraud Risk: LCB processes an average of $4.2 million in domestic wire transfers daily. The wire room has 3 operators and 1 supervisor. Review of Q4 2024 wire logs identified 3 instances where high-value wires ($75,000 to $210,000) were released by a single operator without independent verification — a direct violation of LCB's own Wire Transfer Policy (Section 4.3) and FFIEC guidance on dual-control for wire operations. Additionally, LCB has no automated callback or out-of-band verification process for first-time wire payees — a known Business Email Compromise (BEC) attack vector specifically identified in FinCEN advisories targeting community bank wire rooms. A successful BEC attack could result in an unrecoverable wire loss within a single business day.

🌐 Network Architecture & Communications

Network Segments

VLANNameSubnetSystemsSecurity Notes
VLAN 1Corporate / Default10.1.0.0/16Workstations, ATM Manager (SRV-08), printers, 9 EOL ATMsFlat default VLAN — ATMs and workstations share segment; no microsegmentation
VLAN 10Core Banking10.10.0.0/24Silverlake servers (SRV-01/02), wire terminals, teller workstationsCore banking isolated but wire terminals share segment with general teller systems
VLAN 20Management / IT10.20.0.0/24Server management, backup (SRV-07), IT adminRestricted ACL; only IT staff can reach; best-controlled segment
VLAN 30Branch Connectivity10.30.x.0/24 (per branch)Branch workstations, Meraki MX appliancesAll branches route to FAC-01 via AT&T MPLS; Meraki MX SD-WAN failover to Comcast
VLAN 40Guest / Customer Wi-Fi192.168.40.0/22Customer lobby Wi-Fi (all branches)Isolated — no route to corporate LAN; Meraki content filtering active
VLAN 50VoIP10.50.0.0/24Cisco IP phones (all locations)VoIP VLAN — call recording server logs not included in SIEM
ATM (proposed)ATM NetworkNot assigned14 ATMs (planned isolation)ATM isolation VLAN approved in 2022 network refresh — never implemented; ATMs remain on VLAN 1

Logical Network Diagram

LAKEWOOD COMMUNITY BANK — NETWORK ARCHITECTURE (FAC-01 CORE + BRANCH) INTERNET ┌──────────────┴──────────────┐ │ AT&T BGP (Primary WAN) │ │ Comcast Business (Failover) │ └──────────────┬──────────────┘ ┌───────────────────────────▼──────────────────────────────┐ │ FAC-01 Perimeter — Fortinet FortiGate 200F (HA Pair) │ │ NGFW + IPS (Internet Edge) · FortiManager managed │ └───────────────────────────┬──────────────────────────────┘ ┌───────────────────────────▼──────────────────────────────┐ │ CORE SWITCH — Cisco Catalyst 9300 Stack │ └──┬──────────┬──────────┬──────────┬──────────────────────┘ │ │ │ │ [VLAN10] [VLAN20] [VLAN1⚠] [VLAN30→Branches] Core IT Mgmt FLAT! AT&T MPLS / Meraki MX Banking Server Corp LAN FAC-02 through FAC-07 │ │ │ [SRV-01] [SRV-04] [SRV-08 ATM Mgr] ← ON FLAT VLAN 1 ⚠ [SRV-02] [SRV-07] [9x ATM Win7 EOL] ← ON FLAT VLAN 1 ⚠ [Wire Rm] [SRV-06] [Workstations] ← ALL ON SAME VLAN [SRV-10] [Printers] iSeries AS/400 ⚠ CRITICAL GAP: ATMs + ATM Manager server + corporate workstations share VLAN 1 — lateral movement path from EOL ATM to wire room ┌─────────────────────────────────────────────────────────┐ │ BRANCH FAC-02 through FAC-07 │ │ [Cisco Meraki MX] ←AT&T MPLS→ FAC-01 Core │ │ └── Branch workstations (VLAN 30 per branch) │ │ └── ATMs → route to VLAN 1 corporate ⚠ not isolated │ │ └── Guest Wi-Fi (VLAN 40 — isolated ✓) │ └─────────────────────────────────────────────────────────┘ ┌─────────────────────────────────────────────────────────┐ │ EXTERNAL / VENDOR CONNECTIONS │ │ Jack Henry Support VPN (persistent / always-on) ⚠ │ │ Fiserv ACH (dedicated private circuit — encrypted ✓) │ │ Q2 ebanking (AWS CloudFront / TLS 1.3 ✓) │ │ FHLB Cincinnati correspondent portal ✓ │ └─────────────────────────────────────────────────────────┘
Critical Gap — ATM Network Isolation Failure: 9 of 14 ATMs connect to VLAN 1 (the flat corporate default VLAN) alongside employee workstations and the RealTime ATM Manager server (SRV-08). An ATM running Windows 7 EOL that is compromised would have direct network adjacency to workstations, the ATM management console, and — through permissive ACL rules — the core banking VLAN. This architecture creates a viable attack path from an ATM compromise to the wire transfer system. The planned "ATM isolation VLAN" approved in the 2022 network refresh was never implemented due to resource constraints. Firewall rules between VLAN 1 and VLAN 10 were last reviewed in February 2023.

Internet & WAN Connectivity

LinkCarrierBandwidthPurposeNotes
Primary WANAT&T MPLS100 MbpsBranch MPLS + internet egressSLA 99.9%; managed by AT&T NOC
Backup WANComcast Business500 Mbps fiberInternet failover; branch SD-WAN backupFailover tested annually; last test Sept 2024 — passed; asymmetric bandwidth
Jack Henry Support VPNJack Henry & AssociatesDedicated MPLS VPNCore banking remote support (SRV-01/02)Always-on persistent connection; no activity monitoring; 24/7 Jack Henry privileged access
Q2 ebanking CDNQ2 Holdings / AWS CloudFrontSaaSOnline/mobile banking customer platformQ2-managed; TLS 1.3; Q2 WAF active; LCB has no visibility into WAF events
Fiserv ACHFiserv private networkDedicated circuitACH origination / receivingFiserv-managed dedicated circuit; encrypted; NACHA compliant

🔐 Security Controls & Cybersecurity Posture

Control DomainTool / CapabilityCoverageStatus & Assessment
Perimeter FirewallFortinet FortiGate 200F (HA pair)Internet edge, DMZ, branch VPNDeployed — firewall policy last reviewed Feb 2023; 28 overly-permissive rules; no NGFW application inspection enabled
Intrusion Detection / PreventionFortiGate IPS (inline)Internet edge onlyIPS signatures 45 days behind; no east-west inspection between VLAN 1 and VLAN 10
Endpoint Detection & Response (EDR)CrowdStrike Falcon PreventLending laptops, IT staff (28 agents)NOT deployed on teller workstations, wire room terminals, ATM Manager server (SRV-08), or servers SRV-05/SRV-10
Antivirus (legacy)Windows Defender (built-in)Teller workstations, branch systemsDefender active; not centrally managed; 14 workstations on unsupported Windows 10 build
SIEM / Log ManagementManageEngine EventLog AnalyzerAD, Fortinet firewall, VPNFree-tier deployment — ATM logs, core banking audit logs, ACH logs NOT ingested; 1,400+ unreviewed alerts in queue; no 24/7 monitoring
Multi-Factor AuthenticationMicrosoft Authenticator (M365)M365 for IT + exec (46 accounts)NOT enforced for: 140 branch M365 accounts, core banking (Silverlake) teller access, wire room terminals, Encompass mortgage platform, Kronos HR/payroll
Vulnerability ManagementTenable Nessus Essentials (free)External IP scan only — no authenticated scanUnauthenticated scans miss internal vulnerabilities; ATMs and core banking servers never scanned; last scan 90+ days ago
Email SecurityMicrosoft Defender for Office 365 (P1)Exchange Online (M365)Anti-phishing deployed; on-prem Exchange 2016 (SRV-05) not covered by Defender; SPF/DKIM configured, DMARC policy = "none" (not enforced)
Web Application FirewallQ2 ebanking WAF (Q2-managed)Online/mobile banking platform onlyQ2 manages WAF for customer portal; LCB has no visibility into WAF alerts or logs
Privileged Access ManagementNone deployedGAP — shared admin credentials used for server management; no PAM solution; Jack Henry support VPN has persistent privileged access
Data Loss PreventionNone deployedGAP — loan application data, customer SSNs, and financial records can be copied to USB or personal email without restriction
Backup & RecoveryVeeam B&R 12 (SRV-07)Silverlake DB, AD, file serverBackup integrity last tested March 2024; Iron Mountain weekly offsite; legacy iSeries (SRV-10) not covered by Veeam — manual tape backup only; RTO for Silverlake core never formally tested
Physical SecurityBranch cameras + alarm monitoringBranch lobbies, vault areasCamera footage retained 30 days; FAC-01 server room badge access — no logging or audit trail of physical access events
Summary Gap Assessment: LCB's cybersecurity control posture is assessed at FFIEC CAT Baseline with multiple gaps even at that level. The most critical financial risk vectors are: (1) wire fraud via BEC due to lack of out-of-band verification and inconsistent dual-control; (2) ATM compromise due to Windows 7 EOL units on flat corporate network with direct adjacency to the ATM Manager console; (3) core banking compromise due to persistent Jack Henry support VPN with no monitoring and no MFA on teller/wire access. A ransomware attack encrypting SRV-01 (Silverlake primary) would halt all teller transactions, ACH, and wire processing within minutes, with no tested RTO or recovery playbook.

🤝 Third-Party Relationships & Vendor Risk

LCB relies on a network of technology vendors and fintech partners for core banking, payments, digital banking, and IT services. The GLBA Safeguards Rule (16 CFR §314.4(f)) requires financial institutions to select and oversee service providers that implement appropriate safeguards. LCB has executed vendor agreements with 31 technology providers, but only 4 have been assessed for cybersecurity controls in the past 24 months. No vendors are subject to ongoing security monitoring or annual questionnaires.

Jack Henry & Associates

Core Banking Vendor — Primary Technology Partner
  • Silverlake core banking (on-prem, SRV-01/02)
  • JHA PayCenter debit/card processing (SaaS)
  • Dedicated remote support VPN (persistent, always-on)
CRITICAL risk — persistent always-on VPN with privileged DB access; no session monitoring
Contract: Active (2008, auto-renewing); SOC 2 Type II available but not reviewed by LCB in 3 years

Q2 Holdings

Digital Banking Platform — SaaS
  • Online banking platform (22,400 customers)
  • Q2 mobile app; Q2 Biller (bill pay)
  • Q2 Fraud Analytics (limited LCB visibility)
MEDIUM risk — Q2 SOC 2 Type II reviewed 2024; customer MFA optional only; 31% of customers have MFA disabled
Contract: Active (2021–2026); annual security review by Q2

Fiserv (CheckFree)

ACH Processing — Payments Processor
  • ACH origination/receiving — all business and consumer ACH
  • NACHA-compliant dual-control enforced by platform
  • Fiserv-managed hosted environment
LOW risk — Fiserv-managed with dual-control enforced; SOC 2 Type II current; NACHA compliant
Contract: Active; Fiserv PCI DSS Level 1 compliant

Diebold Nixdorf

ATM Hardware & Software Vendor
  • 14 ATM units (DN200 series — 9 on Windows 7 EOL)
  • ATM hardware break-fix maintenance
  • Remote diagnostics port on corporate LAN (VLAN 1)
HIGH risk — 9 ATMs on Windows 7 EOL; extended support expired Q3 2023; no patch path without $34K/unit hardware replacement
Contract: Active (break-fix only); no security assessment ever conducted

Apiture (Open Banking API)

Fintech Integration Partner — Open Banking API
  • Account aggregation API (Plaid alternative)
  • Third-party app integrations for Q2 platform
  • Access to customer account balance + transaction data
HIGH risk — API accesses customer financial data; no security questionnaire completed; integration added 2022 with no formal vendor review; MFA not enforced for Apiture admin portal
Contract: Active (month-to-month — no security provisions)

NetSol Technologies (MSP)

Managed IT Services — Help Desk & Infrastructure Support
  • Tier 1/2 help desk (business hours)
  • Server patching (excludes Jack Henry systems)
  • Branch Meraki appliance management
HIGH risk — MSP has admin access to AD, SRV-04/SRV-06/SRV-07; last security assessment 2020; SOC 2 Type I only; MSP's own tools not reviewed
Contract: Active; MSP subcontractors not tracked by LCB
Critical Gap — No TPRM Program: LCB has never completed a formal Third-Party Risk Management (TPRM) assessment for any of its 31 technology vendors. The Compliance Officer maintains a vendor contract spreadsheet, but no vendor has been assessed for cybersecurity controls, incident response capability, or subcontractor risk. The GLBA Safeguards Rule §314.4(f) requires covered financial institutions to select service providers based on their ability to maintain appropriate safeguards and oversee them through contract provisions and periodic monitoring. LCB's current approach — standard contracts with no security review — does not meet this requirement. The OCC's 2023 Third-Party Relationships guidance (OCC Bulletin 2023-17) further requires risk-based due diligence proportionate to the risk and criticality of the third-party relationship.

📋 Policies, Governance & Compliance

Existing Policy Documents

Policy NameStatusLast ReviewedNotes
Information Security Program (GLBA)Exists — Outdated2021Does not reflect 2023 GLBA Safeguards Rule updates; cloud services and remote work not addressed
Acceptable Use PolicyExists — Outdated2020Does not address mobile banking apps, personal cloud storage, or BYOD
Wire Transfer PolicyExists — Weakly Enforced2022Dual-control required per policy; 3 violations identified in Q4 2024 wire log review; callback procedure not enforced
Incident Response PlanExists — PartialJanuary 2023Covers general IT incidents; no ransomware-specific playbook; no defined escalation path for after-hours events; never tested via tabletop exercise
Business Continuity PlanExists — Partial2022Covers branch operations during IT outage; does not address core banking DR or ACH processing outage scenarios
Vendor / Third-Party Risk PolicyNoneNo formal TPRM policy; vendor contract spreadsheet maintained by Compliance Officer only
Data Classification PolicyNoneNo formal data classification; customer PII, NPI, and financial records treated uniformly with no tiering
Patch Management PolicyExists — Weak2021Policy exists; ATM systems and vendor-managed servers explicitly exempted; no SLA for critical patches
Privileged Access Management PolicyNoneAd hoc shared admin credentials in use; no formal PAM policy or privileged account inventory
Password PolicyExists — Minimal20228-character minimum; no MFA requirement; password complexity rules only; no MFA mandate
Security Awareness Training PolicyExists — Minimal2022Annual KnowBe4 training required; completion rate 78%; no phishing simulation program
Remote Access PolicyExists — Outdated2020Does not address persistent vendor VPN (Jack Henry); no time-limited access provisions for third parties
FFIEC CAT AssessmentBaseline — Self-Assessed2023Self-assessed at Baseline maturity level; not validated by OCC examiner; gaps in Cyber Risk Management and Oversight domain identified

Regulatory Framework Summary

Framework / RegulationApplicabilityCurrent Compliance Status
GLBA Safeguards Rule (16 CFR Part 314 — 2023)Fully applicable — financial institutionAt risk — 2023 rule updates (encryption, MFA, audit logging, TPRM) not fully implemented; annual Board report required
FFIEC IT Examination HandbookApplicable — OCC examination standardSelf-assessed Baseline; gaps in Access Controls, Situational Awareness, and Third-Party Risk domains
OCC Heightened Standards (12 CFR Part 30, App D)Applicable — OCC-chartered bankFront-line risk management framework; IT risk appetite not formally defined or approved by Board
PCI DSS v4.0 (Level 4 Merchant)Applicable — card processingSAQ-D completed 2023; ATM EOL systems create cardholder data environment risk; QSA not engaged — self-assessment only
FinCEN BSA/AML (31 CFR Chapter X)Fully applicableBSA/AML program active; 2 BSA analysts; SAR/CTR filing current; no regulatory findings in last OCC exam
NACHA Operating RulesApplicable — ACH originator/receiverCheckFree/Fiserv manages platform compliance; dual-control enforced; no ACH violations reported
OCC Third-Party Relationships (Bulletin 2023-17)Applicable — OCC guidanceTPRM program does not meet OCC 2023-17 expectations; no risk-tiered vendor due diligence process
CFPB Regulation EApplicable — electronic fund transfersError resolution procedures documented; customer dispute SLA met in 2024
NY DFS 23 NYCRR 500Not applicable — Ohio-domiciled, OCC charterN/A — monitored for best practices only
C2M2 v2.1Voluntary — assessment purposeNo prior formal evaluation — this exercise is the first structured C2M2 assessment

🎯 C2M2 Domain Assessment Preparation

The following summarizes pre-assessment findings for each of the 10 C2M2 v2.1 domains based on discovery interviews and documentation review. These ratings are indicative and serve as starting points for the assessment exercise. Participants should evaluate and challenge these preliminary findings during the exercise.

Indicative: MIL 1

🗂️ ASSET — Asset, Change & Configuration Mgmt

  • IT asset inventory maintained in spreadsheet (Excel) — 78% accurate by last audit
  • No formal CMDB; server inventory maintained manually by IT Director
  • ATM inventory in Diebold contract docs — no OS version, patch status, or network attributes
  • Core banking servers tracked; SRV-10 (legacy iSeries) not in formal inventory
  • No configuration baseline for network devices; Meraki auto-config only
  • Software license inventory outdated — 14 applications not tracked
Indicative: MIL 0

🛡️ THREAT — Threat & Vulnerability Mgmt

  • FS-ISAC membership (2021) — alerts received but not acted upon systematically
  • Tenable Nessus Essentials (unauthenticated) — last scan 90+ days ago
  • No formal vulnerability prioritization process; ATMs never scanned
  • Vendor security bulletins (Diebold ATM advisories) not tracked
  • No threat intelligence platform or IOC sharing program
  • 9 ATMs with Windows 7 EOL: CVE count in the hundreds; no compensating controls documented
Indicative: MIL 1

⚖️ RISK — Risk Management

  • Annual GLBA Information Security Risk Assessment performed by Compliance Officer
  • Risk register in spreadsheet — 19 open items; limited remediation tracking
  • Wire transfer fraud risk identified but not formally risk-accepted or mitigated
  • Board has never received a formal cybersecurity risk briefing
  • Cyber insurance $5M limit; coverage not reviewed against current risk profile since 2022
  • No formal risk acceptance process; ATM EOL risk informally deferred by CEO
Indicative: MIL 1

🔑 ACCESS — Identity & Access Mgmt

  • Active Directory manages 210 domain accounts
  • MFA enforced only for IT staff and executives (46 of 185 users)
  • Core banking (Silverlake) accessed via username + password only — no MFA for 139 teller/wire operators
  • Wire room terminals: no MFA, no session timeout enforcement, shared login reported at FAC-04
  • Jack Henry support VPN: persistent privileged access — no time limitation, no activity monitoring
  • 7 terminated employee accounts not disabled within 24 hours per policy (Q4 2024 HR audit finding)
Indicative: MIL 0

👁️ SITUATE — Situational Awareness

  • ManageEngine EventLog Analyzer covers AD + firewall only — no core banking, ATM, or ACH logs
  • No 24/7 Security Operations Center or after-hours monitoring
  • 1,400+ unacknowledged alerts in EventLog Analyzer queue
  • No network traffic analysis (NTA); no behavioral analytics
  • FS-ISAC threat intel not correlated with internal log data
  • No visibility into Jack Henry VPN activity or Q2 ebanking platform security events
Indicative: MIL 1

🚨 RESPONSE — Event & Incident Response

  • Incident Response Plan exists (Jan 2023) — covers general IT incidents
  • No ransomware-specific playbook or wire fraud response procedure
  • No IR retainer with external forensics or incident response firm
  • No tabletop exercise ever conducted
  • After-hours escalation path undefined — IT Director is sole on-call contact
  • No documented RTO/RPO for core banking system (Silverlake)
Indicative: MIL 0

🤝 THIRD-PARTIES — Third-Party Risk Mgmt

  • 31 technology vendors — 0 cybersecurity assessments in past 24 months
  • Jack Henry VPN: persistent privileged access, no monitoring, no time-bound sessions
  • Diebold: EOL ATM hardware, no security review in 4+ years
  • Apiture fintech API: no security questionnaire; month-to-month contract, no security provisions
  • NetSol MSP: admin access to AD and 3 servers; last review 2020; SOC 2 Type I only
  • No TPRM policy; no vendor risk tiering; no incident notification SLA in any contract
Indicative: MIL 1

👷 WORKFORCE — Workforce Management

  • Annual security awareness training (KnowBe4) — 78% completion rate
  • No phishing simulation program
  • Wire room operators not trained on BEC / social engineering tactics
  • Background checks conducted at hire; no periodic re-screening
  • IT Security Analyst (Jamie Walters) has no formal cybersecurity certification
  • No cybersecurity roles defined in HR job descriptions for non-IT staff
Indicative: MIL 1

🏗️ ARCH — Cybersecurity Architecture

  • Perimeter firewall (FortiGate 200F) deployed — policy stale since Feb 2023
  • ATMs on flat corporate VLAN 1 with workstations — no segmentation despite 2022 network refresh plan
  • No microsegmentation; lateral movement path from compromised ATM to core banking VLAN via permissive ACL
  • Legacy iSeries (SRV-10) connected to corporate LAN for file transfers — isolated rack but routable
  • DMARC policy = "none" — email spoofing of lcbankohio.com domain fully possible
  • No encryption-at-rest verification for SRV-06 file server (contains loan application PII, NPI)
Indicative: MIL 1

📋 PROGRAM — Cybersecurity Program Mgmt

  • No dedicated CISO; CIO/IT Director serves informally as Information Security Officer
  • IT budget $1.8M (6.3% of revenue); cybersecurity sub-line $142K — below FS-ISAC peer benchmarks
  • GLBA Information Security Program last updated 2021 — does not reflect 2023 rule updates
  • Board has never received a cybersecurity briefing or approved a risk appetite statement
  • No formal cybersecurity strategic plan or multi-year roadmap
  • FFIEC CAT self-assessed at Baseline (2023); not validated externally by OCC or independent assessor

✏️ Exercise Discussion Questions & Scenario Injects

Assessment Questions

Q1 — Asset Management (ASSET domain):

LCB's IT asset inventory is maintained in a spreadsheet that is 78% accurate and does not include OS versions or network attributes for ATMs. Using C2M2 ASSET domain practices, design a minimum-viable asset inventory for a community bank. What data elements are critical for financial sector cyber risk management? What is the business case for deploying an automated asset discovery tool in a 185-employee bank? How do ATMs and payment terminals create unique asset management challenges under PCI DSS cardholder data environment requirements?

Q2 — Identity & Access (ACCESS domain):

Core banking access (Silverlake) uses username and password only for 139 teller and wire operators. The wire room has documented instances of shared credentials. How does C2M2 ACCESS domain guidance apply to a bank's teller access model? What MFA approaches are compatible with high-volume teller transaction workflows? How do you address the tension between operational efficiency and FFIEC examination expectations for strong authentication on systems that process customer financial transactions?

Q3 — Wire Transfer Fraud (THIRD-PARTIES / RESPONSE domains):

LCB processes $4.2M in daily wire transfers. Three high-value wires in Q4 2024 were processed by a single operator in violation of LCB's own dual-control policy. LCB has no callback verification process for first-time wire payees. Business Email Compromise (BEC) targeting community bank wire rooms is FinCEN's most frequently reported fraud type for financial institutions. Design a wire transfer security framework for LCB that addresses: dual-control enforcement, new payee verification, out-of-band callback procedures, and wire room staff training. Which C2M2 domains are most relevant to wire fraud prevention, and which specific practices apply?

Q4 — ATM Security (ARCH / ASSET domains):

9 of 14 LCB ATMs run Windows 7 Embedded (EOL since January 2020) on the same VLAN as employee workstations. Replacing all EOL units would cost $306,000 — budget has not been approved. Using C2M2 ARCH and ASSET domain practices, develop a compensating controls strategy for EOL ATM systems. What network isolation controls, enhanced monitoring requirements, and formal risk acceptance documentation would the OCC expect? At what point does a compensating controls approach become untenable from a regulatory standpoint, and what arguments should Kevin Merritt make to the Board to approve hardware replacement?

Q5 — Third-Party Risk (THIRD-PARTIES domain):

Jack Henry has a persistent always-on VPN with privileged access to the Silverlake core banking database. LCB has not reviewed Jack Henry's security posture in 3 years. The Apiture fintech API accesses customer account data under a month-to-month contract with no security provisions. Using C2M2 THIRD-PARTIES practices and OCC Bulletin 2023-17, build a vendor risk tiering model for LCB. Which 5 vendors represent the highest risk and why? What contractual security provisions should LCB require in all technology vendor agreements going forward?

Q6 — Situational Awareness (SITUATE domain):

LCB's SIEM (ManageEngine EventLog Analyzer) covers only AD and the perimeter firewall. Core banking audit logs, ATM transaction logs, and ACH processing logs are not ingested. The 1,400+ unreviewed alert backlog means active threats may have gone undetected for months. Construct a prioritized logging and monitoring strategy for LCB given its 6-person IT team. What is the minimum viable SIEM use case set for a community bank processing daily wire transfers? Should LCB pursue a co-managed SIEM or a financial sector-specific MSSP, and what should a community bank require in an FS-sector managed security services contract?

Q7 — Program Management (PROGRAM domain):

The LCB Board of Directors has never received a cybersecurity briefing and has not approved a risk appetite statement. Kevin Merritt (CIO) manages security responsibilities alongside all IT operations. The cybersecurity budget of $142K is below FS-ISAC peer benchmarks for institutions of LCB's asset size ($620M). Using C2M2 PROGRAM domain practices, what governance changes would establish a minimum viable financial institution cybersecurity program? Draft the key elements of a Board-level cybersecurity risk briefing appropriate for community bank directors focused primarily on lending, deposits, and regulatory safety-and-soundness — with no technical background.


Scenario Injects (Optional Tabletop Extensions)

🚨 Inject A — "Ghost Wire": Business Email Compromise Attack

Scenario: On a Monday morning, Operations Manager David Reyes receives what appears to be an urgent email from Chief Lending Officer Patricia Greene (patricia.greene@lcbankohio.com — domain spoofed; LCB's DMARC policy is "none"). The email instructs the wire room to process an emergency $187,500 wire to a new payee (Riverside Holdings LLC, routing to a Lithuania correspondent bank) for "construction loan funding — time-sensitive, do not delay." A wire operator processes the wire using the standard workflow — no dual-control verification, no callback to the CLO. The wire clears Fedwire at 9:47 AM. At 10:15 AM, Patricia Greene calls David Reyes asking about a loan document — she never sent any wire instruction.

  • What immediate containment actions are possible once the fraudulent wire is identified? What is the Fedwire/SWIFT recall process and its typical success rate after the wire has cleared?
  • Which specific policy violations and control gaps enabled this attack? Which C2M2 domains are directly implicated?
  • LCB's DMARC policy is "none" — how does this enable email domain spoofing? What SPF/DKIM/DMARC configuration should LCB implement, and what is the implementation cost and timeline?
  • What FinCEN Suspicious Activity Report (SAR) filing obligations exist for a confirmed BEC wire fraud event? What is the filing timeline?
  • How should LCB redesign its wire transfer workflow — including technological and procedural controls — to prevent recurrence without unacceptably slowing legitimate wire operations?
💻 Inject B — ATM Jackpotting Attack Discovery

Scenario: At 2:30 AM Saturday, an after-hours email alert from ManageEngine EventLog Analyzer fires to IT Director Kevin Merritt — flagging unusual outbound traffic from the VLAN 1 segment. Kevin is asleep and doesn't see the alert until 7:00 AM. By then, ATM transaction logs (reviewed Monday after the branch manager reports empty cassettes) show that ATMs FAC-02-ATM-01 and FAC-04-ATM-01 — both Windows 7 EOL units — dispensed their entire cash cassettes ($48,000 combined) between 2:15 and 2:45 AM. Physical inspection shows no signs of forced entry or card skimming. The ATMs' Windows 7 event logs show a remote RDP connection from an internal IP (10.1.18.42 — SRV-08, the RealTime ATM Manager server) exactly 11 minutes before the cash-out sequence began.

  • What does this attack chain suggest about how the attacker moved from initial network access to ATM jackpotting? Which specific network architecture gap enabled lateral movement from initial access to the ATM Manager console to the ATMs?
  • LCB had no 24/7 monitoring. What is the minimum after-hours monitoring capability a community bank processing daily ATM cash should maintain? What would the after-hours SOC model cost?
  • What evidence preservation steps must occur before systems are remediated? Who leads the forensic investigation — LCB IT staff, the MSP (NetSol), or an external firm?
  • What OCC notification obligations apply following a significant operational incident involving customer fund loss? What is the reporting timeline under GLBA §314.6?
  • Which three specific C2M2 domain gaps most directly enabled this incident? For each, identify the specific practice that was not in place.
🔗 Inject C — Core Banking Vendor Breach (Jack Henry Supply Chain)

Scenario: On a Thursday afternoon, Jack Henry & Associates issues a security notice to all Silverlake clients: a threat actor exploited a vulnerability in the Jack Henry remote support VPN infrastructure and gained unauthorized access to client environments through persistent support VPN sessions. Jack Henry cannot confirm which specific client environments were accessed or what data may have been exfiltrated. Jack Henry's own log retention covers only the last 21 days. LCB's Jack Henry support VPN has been always-on and unmonitored for 3 years. That VPN session has privileged access to the Silverlake core banking database — which contains account numbers, SSNs, balances, and transaction history for all 22,400 LCB customers.

  • What are LCB's immediate containment actions? How do you terminate the Jack Henry VPN without disrupting Silverlake core banking operations during active business hours — and what are the operational consequences if you cannot?
  • Under GLBA §314.6 (2023 Safeguards Rule), LCB must notify its primary federal regulator (OCC) within 30 days of becoming aware of a notifiable event. Does this incident trigger that requirement? Who at LCB prepares the OCC notification, and what must it contain?
  • What customer notification obligations apply under GLBA and applicable state breach notification law (Ohio Rev. Code §1349.19)? What triggers the notification clock — the Jack Henry notice, or LCB's own investigation conclusion?
  • How do you assess the scope of potential data exposure given that Jack Henry's logs only go back 21 days and LCB has no monitoring of VPN session activity?
  • What contractual provisions should LCB have required in the Jack Henry agreement that would have limited this risk? Which specific C2M2 THIRD-PARTIES practices would have provided early warning or reduced exposure?

Remediation Planning Exercise

Constraints: LCB's Board has approved a one-time cybersecurity improvement budget of $175,000 (FY2025 supplemental). Kevin Merritt must present a prioritized remediation roadmap at the next Board meeting. The roadmap must identify Quick Wins (0–90 days, low-cost), Short-Term actions (90 days – 1 year), and Strategic investments (1–3 years). The 6-person IT team cannot absorb more than 15 hours/week of new project work above BAU. ATM hardware replacement ($306K for all 9 EOL units) is not included in this budget cycle.

  • Which three security gaps represent the highest financial and regulatory risk to LCB and its customers, and should be addressed first regardless of cost?
  • Assign rough cost estimates and implementation effort levels to the top 10 remediation items. Identify which can be accomplished within the $175,000 budget.
  • What is the business case for engaging an MSSP (Managed Security Services Provider) specialized in community banking? What should LCB require in a community bank MSSP contract — and how does MSSP cost compare to hiring a dedicated CISO?
  • How would implementing DMARC enforcement (p=reject) affect LCB's BEC exposure, and what is the realistic implementation cost and timeline? Why is this a high-value Quick Win?
  • How do you communicate cybersecurity risk and the strategic need for a dedicated CISO to a community bank Board that is primarily focused on net interest margin, loan growth, and OCC examination ratings?