Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >Breaches happen – here’s how CNI organisations can build resilience to cyber attacks
    Technology

    Breaches Happen – Here’s How Cni Organisations Can Build Resilience to Cyber Attacks

    Published by Jessica Weisman-Pitts

    Posted on October 14, 2022

    7 min read

    Last updated: February 3, 2026

    Add as preferred source on Google
    This image highlights the vulnerability of Critical National Infrastructure to cyber attacks. It illustrates the importance of building resilience against ransomware threats, particularly in sectors like finance and healthcare.
    Illustration of cybersecurity breach affecting Critical National Infrastructure - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Tags:cybersecurityfinancial servicestechnologyrisk management

    By Raghu Nandakumara, Head of Industry Solutions, Illumio

    From energy and water supply to transport and healthcare, there are multiple industries that fall under the banner of Critical National Infrastructure (CNI) that not only function as private organisations, but are also essential to the fabric of our society and economy. While less obvious than physical infrastructure, the invisible flow of capital and commerce through the financial sector underpins our daily lives.

    Disruption to CNI providers can have a huge impact on a national or even international scale – and organised cyber criminal groups are preying on this weakness.

    In a conversation with Raghu Nandakumara, Head of Industry Solutions at Illumio, we discuss exactly why cyber criminals are targeting CNI organisations with a vengeance, and how this increasingly vulnerable sector can bolster cyber resilience to remain safe and keep operations up and running.

    Why are Critical National Infrastructure organisations an appealing target for cyber criminals, and how vulnerable are financial organisations specifically?

    Most cyber attacks are motivated by profit. As a result, attackers have traditionally focused on sectors like hospitality and retail that hold a lot of personal and financial data for criminals to easily exploit and sell onto others.

    However, more recently, organised groups are adopting ransomware as their primary money maker. The aim is to cause as much disruption as possible in the hopes of pressuring the victim into paying a ransom demand to restore their systems quicker.

    CNI organisations are particularly appealing targets for this tactic because of the critical role they play in society. If a CNI organisation suffers an outage due to ransomware, they’re more likely to pay a ransom in order to restore operations quickly – because so many individuals and organisations rely on their services.

    Savvier groups have also started using a “double extortion” approach, where they not only deploy disruptive ransomware, but also exfiltrate valuable data to use as blackmail or to sell on the dark web.

    Many firms in the financial sector are unfortunately a perfect target for both goals – they hold large amounts of valuable personal and financial data, and underpin the economy by facilitating payments and providing access to capital. Repeated disruption to these services will cause issues that ripple far beyond the business itself.

    So, securing finance and other CNI is not just about withstanding a single attack. Providers need to be resilient enough to survive multiple attacks while keeping essential services online and protecting critical assets. With the right cyber security architecture and technology, not every cyber attack needs to be a disaster.

    How do ransomware attacks within the financial sector unfold?

    Attacks usually follow the same common tactics, regardless of sector.

    Historically, attackers have used a ‘spray and pray’ method where the threat actor sends out malicious links and files to a large, unrefined list of targets via email (this is also known as a “phishing” attack). The hope is that enough recipients will unknowingly enable the malware (i.e., by clicking on a link or opening a file in the email) and lack the right protection to stop the attack from moving throughout their organisation.

    Today, attacks are far more targeted as more advanced tools and techniques have spread through the cyber criminal community. . Attacks start with the attacker gaining initial access and can originate from a variety of vectors. Then once in, attackers will execute their malware, steal credentials and move throughout an organisation by by elevating their privileges.

    When they have everything in place, the intruder will finally strike, deploying a devastating ransomware attack that can lock the firm down from the inside out.

    The primary objective will be shutting down access to essential data files or disabling critical services. In financial organisations, the most important files will be the customer, transaction, and deal data that’s essential for normal business activity. With these files encrypted, the operation grinds to a halt. Compromising this data goes beyond operational delays and puts the reputation of the financial institution on the line. The financial services industry is based on trust – if you lose trust, you lose everything. Once a ransomware attack spreads to reach critical data, organisations often have no choice but to pay.

    How can financial organisations protect themselves – and the wider economy – from ransomware?

    Ransomware attacks are built around causing the maximum amount of damage in the shortest time frame with minimal effort. With this in mind, defences need to be geared around making it as difficult as possible for intruders, whether human threat actors or automated malware, to move across an organisation’s hybrid IT estate and infrastructure.

    Zero Trust Segmentation is one of the most effective ways of achieving this. With Zero Trust Segmentation, the IT infrastructure is divided into separate sealed-off sections, preventing unauthorised movement from one area to the next without proper verification. It’s predicated on the Zero Trust principles of “assume breach” and “never trust, always verify.”

    This makes it incredibly difficult and cumbersome for attackers to move, preventing them from reaching their intended goal. In one scenario, organisations leveraging Zero Trust Segmentation were able to stop attacks in 10 minutes, nearly four times faster than detection and response capabilities alone, and the attacker was not able to progress beyond the first infected system.

    In order to glean the most value from Zero Trust Segmentation, organisations need to prioritise securing their most critical and vulnerable assets first.

    Effectively applying Zero Trust policies relies on having visibility into access rights and user behaviour across the environment from the start. With that information, organisations can determine what is most important to protect immediately, and begin deploying segmentation policies around those points. Customer data and transaction systems will be the top priority for most financial firms. It’s also essential that organisations understand their attack surface and pinpoint the most likely points of entry. From there, security teams can block the attack paths intruders are most likely to follow.

    This approach shifts away from more traditional schools of thought. Where once the focus was only on building a strong defensive perimeter to “keep bad actors out,” today’s hyperconnected world has shown us that breaches are bound to happen. In fact, for most organisations, threats are already lurking in data centres, cloud environments, or on endpoints. In order to build resilience and minimise impact, organisations (especially those in CNI sectors) must proactively prepare to be breached.

    What is the ‘assume breach’ mindset, and how can financial firms put it into practice?

    Our world of hyperconnectivity and hybrid work has brought with it an abundance of new threat vectors for bad actors to take advantage of. In fact, in the last two years alone, 76 percent of organisations were hit with ransomware. “Assume breach” is built on the idea of accepting that, inevitably, a threat actor will breach external defences, no matter how robust they are. This then naturally leads to building out defences that contain that breach to the smallest possible footprint.

    Around five years ago, security teams began to accept that breaches occur even with the best preventive measures in place. Then, they started to focus on detecting and responding to a threat, rather than just trying to prevent it. The challenge is that breaches still move, often undetected to reach valuable assets. While it’s still important to find and respond to breaches, many organisations are moving to a more proactive approach that puts “assume breach” into practice by stopping attacks from spreading automatically.

    This is the era of “breach containment,” where security teams focus on stopping attacks from moving throughout the network by default to minimise their impact and reduce risk. Strategies like Zero Trust Segmentation stop attackers in their tracks by default, so critical data remains safe and business operations can continue unfettered, even after a breach occurs.

    This approach makes financial firms resilient to cyberattacks. And by extension, when CNI organisations implement tools like Zero Trust Segmentation, they also bolster the resilience of the wider economy and community relying on their services.

    Frequently Asked Questions about Breaches happen – here’s how CNI organisations can build resilience to cyber attacks

    1What is ransomware?

    Ransomware is a type of malicious software that encrypts a victim's data, rendering it inaccessible until a ransom is paid to the attacker.

    2What is Zero Trust Security?

    Zero Trust Security is a cybersecurity model that assumes threats could be inside or outside the network, requiring strict verification for every user and device.

    3What is cyber resilience?

    Cyber resilience refers to an organization's ability to prepare for, respond to, and recover from cyber attacks while maintaining essential functions.

    4What is a phishing attack?

    A phishing attack is a method used by cybercriminals to trick individuals into revealing sensitive information, often through deceptive emails or messages.

    5What is critical national infrastructure?

    Critical national infrastructure includes essential services and facilities, such as energy, water supply, and financial systems, that are vital for the functioning of society.

    More from Technology

    Explore more articles in the Technology category

    Image for Innovation Through Partnership: The Role of External Tech Teams
    Innovation Through Partnership: The Role of External Tech Teams
    Image for Nominations Open for Technology Awards 2026
    Nominations Open for Technology Awards 2026
    Image for Nominations Open for Innovation Awards 2026
    Nominations Open for Innovation Awards 2026
    Image for Archie earns industry recognition across G2, Capterra, and SoftwareReviews
    Archie Earns Industry Recognition Across G2, Capterra, and SoftwareReviews
    Image for The Bankaool Transformation: How a Regional Mexican Bank Became a Fintech Disruptor
    The Bankaool Transformation: How a Regional Mexican Bank Became a FinTech Disruptor
    Image for Submit Your Entry Today for Digital Banking Awards 2026
    Submit Your Entry Today for Digital Banking Awards 2026
    Image for Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Image for Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Image for Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Image for Entrepreneurial Discipline in the AI Economy: Insights from Dmytro Lavryniuk
    Entrepreneurial Discipline in the AI Economy: Insights From Dmytro Lavryniuk
    Image for Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Image for Call for Entries: Best Digital Wallet 2026
    Call for Entries: Best Digital Wallet 2026
    View All Technology Posts
    Previous Technology PostHead in the Cloud: How Businesses Can Optimise Their Cloud Usage Without Unintended Consequences
    Next Technology PostHow to Outsmart Increasingly Complex Cyber Attacks