OFFICIAL PUBLICATION OF THE UTAH BANKERS ASSOCIATION

2026 Pub. 14 Issue 1

Cybersecurity Compliance After FFIEC CAT

New Expectations for Financial Institutions

Cybersecurity Compliance After FFIEC CAT

New Expectations for Financial Institutions

For nearly a decade, financial institutions relied on the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool (CAT) as a practical way to measure cyber risk. When it was introduced in 2015, it gave financial institutions a structured starting point. For many organizations, it was the first time cybersecurity had been framed in a way that boards and executives could clearly understand.

The CAT worked because it was straightforward. It helped institutions assess inherent risk and answer maturity questions using a structured, mostly yes-or-no format. That simplicity allowed community and regional institutions to improve their cyber posture without building large compliance teams.

But the threat landscape has changed.

Cyber risks now move faster than static assessment tools can keep pace. Ransomware, cloud migration, third-party risk and regulatory scrutiny have all increased significantly since 2015. In response, the FFIEC announced that the CAT would be retired and encouraged institutions to transition to more comprehensive frameworks, including the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 2.0.

This shift is more than a paperwork update; it represents a fundamental change in expectations.

From Answering Questions to Proving Controls

Under the CAT, institutions largely demonstrated compliance by completing structured questionnaires. If you had a backup process, you answered “yes.” If you had vendor management procedures, you marked the appropriate maturity level.

The NIST CSF 2.0 model moves beyond self-attestation. Regulators increasingly expect evidence.

For example, it is no longer enough to state that backups occur. Institutions should be prepared to show:

  • The written policy governing backups
  • The procedures staff follow
  • System logs proving backups are running as scheduled
  • Oversight demonstrating management review

This evidence-based approach applies across governance, access management, incident response and third-party oversight. It requires documentation, monitoring and accountability at a level many smaller institutions have not historically needed.

The Scale Difference

The gap between CAT and CSF 2.0 can feel significant, especially for community institutions.

The CAT framework was centered on inherent risk categories and maturity domains. CSF 2.0 organizes cybersecurity into core functions such as Govern, Identify, Protect, Detect, Respond and Recover, with detailed outcomes beneath each.

In practical terms, this means:

  • More controls to map to policies
  • More documentation to maintain
  • More technical configurations to monitor
  • Ongoing evidence collection, not periodic review

For IT teams of two or three people, this can feel overwhelming. What once required completing an assessment may now require building a structured control environment with continuous validation.

What Examiners Are Looking For

The good news is that regulators appear to understand that transition takes time. Early supervisory conversations suggest examiners are focusing on preparedness rather than immediate perfection.

Institutions should be ready to demonstrate:

  1. Framework Selection: A documented decision to transition from CAT to a recognized framework such as CSF 2.0
  2. Gap Assessment: An honest evaluation of where current controls fall short
  3. Board Oversight: Evidence that directors are informed and engaged in the transition
  4. Execution Plan: A timeline with defined milestones and resource planning

Board engagement is especially important. Cybersecurity is no longer viewed solely as an IT issue; it is an enterprise risk issue. Examiners increasingly expect board minutes and risk committee discussions to reflect that understanding.

Why This Matters

The move away from CAT is not simply regulatory housekeeping. It reflects a broader shift in how cybersecurity risk is viewed across the financial sector.

Customers expect resilience. Regulators expect accountability. Cyber insurance carriers expect documented controls. A framework like CSF 2.0 helps institutions align with all three.

While the transition may require investment, whether in staffing, advisory support or monitoring tools, it also creates clarity. Institutions that build structured, documented control environments are better positioned to withstand cyber events and regulatory scrutiny.

Practical Next Steps

For institutions beginning this journey, three steps can reduce friction:

  1. Start with a structured gap analysis. Compare current CAT-based practices against CSF 2.0 outcomes. Identify what already exists and where documentation or evidence is missing.
  2. Develop a phased roadmap. Not everything must be implemented at once. A 12- to 24-month transition plan with board approval demonstrates seriousness and direction.
  3. Build evidence habits early. Encourage teams to document processes, retain logs and formalize review cycles. Small changes now prevent large compliance burdens later.

The retirement of the FFIEC CAT marks the end of a simpler compliance era. What replaces it is more demanding, but also more aligned with today’s risk environment.

For financial institutions, the question is not whether the compliance wave is coming; it is whether the organization is building the structure necessary to meet it with confidence rather than urgency.

Bryan Boam is the CEO of Azureity Inc., a managed security services provider (MSSP) specializing in cybersecurity and regulatory compliance for the financial services industry. With more than 20 years of experience, Bryan and his team have supported financial institutions of all sizes with technology strategy, implementation, monitoring and compliance initiatives.

Bryan holds a bachelor’s degree in finance from the University of Utah and has served as a technology consultant both nationally and internationally. His work focuses on helping organizations strengthen their security posture while navigating complex regulatory environments.

Sign Up to Receive this Publication in your inbox​

More Articles In This Issue​