While the SANS list makes End Users responsible for keeping things like anti-virus up to date and operating systems patched, these functions can be and should be automated by IT staff.
Executive staff, according to the SANS article, have a much bigger responsibility. Many of the breaches that are known to have occurred in 2005 were the result of dishonest insiders, hackers, or poor security procedures (i.e., losing a backup tape). Encryption is a big deal in the world of networking and may require revamping the network in terms of encryption capable hardware and bandwidth needs. It is management’s responsibility to develop and mandate security policies, so that secure processes and procedures must be in place before systems “go live”, as well as make sure that IT is properly staffed.
A comprehensive Security Awareness program would go a long way towards educating banking employees at every level.
The breakdown of End User, Executive Staff, and Information Technology people is a good way to start. IT people need to understand that every time they rush to meet a deadline and put an unsecured system into production, they are jeopardizing the security and safety of the bank.
http://www.bankinfosecurity.com/articles.php?art_id=103&PHPSESSID=8af89b3eb8240a0e33ca65c806a8ac16