Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > CYBERSECURITY & THE FINANCIAL SERVICES SPACE IN 2017
    Technology

    CYBERSECURITY & THE FINANCIAL SERVICES SPACE IN 2017

    CYBERSECURITY & THE FINANCIAL SERVICES SPACE IN 2017

    Published by Gbaf News

    Posted on April 22, 2017

    Featured image for article about Technology

    By Tom Gilheany, Product Manager, Learning@Cisco

    You don’t have to look far to find examples of cybercrime in the financial services space.For instance, back in January, Lloyds Banking Group was the target of an online attack.

    Tom Gilheany

    Tom Gilheany

    The 48-hour fiasco involved cybercriminals trying to block access to 20 million U.K. accounts.The hackersaimed to do that by running denial of service attacks.

    The good news is that no accounts were hacked, and Lloyds did not pay a ransom.The bad news is that the attacks temporarily blocked some customers from logging on, and that we have yet another reminder that the financial services sector must beever vigilant about cybersecurity.

    Indeed, the past year helped illustrate just how at risk we all are.

    2016 in cybercrime

    There was something like 3,000 publicly disclosed data breaches worldwide in 2016. That exposed about 2.2 billion records. publicly

    Yahoo was the subject ofthe largest hack in history. That moved Verizon to reconsider its offer price for the company.

    Distributed denial of service attacks demonstrated how the Internet of Things can be enlisted to do damage to targeted systems.

    Cybersecurity was even a theme in the U.S. presidential election.

    Ransomware was also center stage in 2016. Yielding high profits to cybercriminals, it’s expected to stay there in the months ahead.

    In the first quarter of 2016 alone there was an average of over 4,000 attacks per day, according to Deloitte. That was a 300 percent increase from the 1,000 ransomware attacks per day the prior year.

    In fact, ransomware is now considered the top cybersecurity threat to the financial industry.

    Fifty-five percent of the financial services firms surveyed by SANS recently said they consider ransomware the biggest threat to their business. And more than 32 percent of financial firms said ransomware attacks have resulted in losses of between $100,000 and $500,000.

    The money and reputations at stake from cyberattacks, and the attention these activities are getting in the press, are making thisa very high stakes game. So high stakes, in fact, that regulators are expected to play a growing role in it going forward.

    Of course, the Cybersecurity Act of 2015is already in place. That encourages voluntary sharing of cyberthreat information between private entities and the federal government, as well as within agencies of the federal government.

    The scope and language of that law is very general, however.

    New financial cybersecurity regulations in 2017

    Now the incoming administration, which already voiced its interest in cybersecurity during the president campaign, has the opportunity to add some meat to these bones. The incoming administration is not expected to be heavy handed with regulations;however, the high-profile subject of cybersecurity could be the exception.

    But whoever takes the lead on it, authoring cybersecurity regulation would enable those individuals to make their mark on a high-profile issue that’s getting a whole lot of attention.

    We’ve already seen a fair amount of actual movement on this front.

    The Group of Seven industrial powers in October agreed on guidelines to protect the global financial sector from cyberattacks. That followed various cross-border bank thefts at the hands of hackers.

    “Increasing in sophistication, frequency, and persistence, cyber risks are growing more dangerous and diverse, threatening to disrupt our interconnected global financial systems and the institutions that operate and support those systems,” the G7 document notes.

    Down under, Australia has developed a national strategy through which government and the private sector are working together to address cybersecurity. Last year it issued a white paper describing major risks and initiatives on this front. And a few years ago it created the Australian Cyber Security Centre, an initiative to make the country’s networks harder to compromise.

    Meanwhile, the European Union has approved cybersecurity rules that force businesses to strengthen their defenses. They require banking, energy, and major tech companies to report attacks. And they talk about how EU nations must cooperate on network security matters.

    The European Union’s General Data Protection Regulation required four years of negotiation and about 4,000 amendments before being passed, according to Financier Worldwide.

    “Financial institutions and service providers to the financial industry process a vast amount of personal data on a daily basis,” notes the article. “Much of the data processed is confidential and sensitive. This means there are increased risks and a likelihood of a focus on this sector by supervisory authorities, which will have new rights to audit and to impose administrative fines. Indeed, the GDPR allows for administrative fines which can amount to a maximum of €20m or 4 percent of the global annual turnover of a company.”

    And at least 28 U.S. states last year considered or introduced cybersecurity legislation, according to The National Conference of State Legislatures.

    Most of these laws and bills address national infrastructure and governmental agencies. But some of them specifically target the interests of organizations, including financial service organizations.

    For example, one of the three cybersecurity bills signed into law in California last year makes it a crime for a person to knowingly introduce ransomware into any computer, computer system, or computer network.

    A new law in Coloradocalls for the creation of a state cybersecurity council to provide policy guidance to the governor. That council will also coordinate with the general assembly and the judicial branch regarding cybersecurity.

    Utah has enacted civil penalties for hackers.And Washington State has established the State Cybercrime Act.

    Looking ahead

    That said, financial services with a stake in cybersecurity and related regulations – which is to say most of them – need to be ready for what’s happening on that front.

    Banks that aren’t already involved in the cybersecurity discussion may want to start voicing their opinions and offering a hand on these efforts now, before cybersecurity regulatory decisions are cemented.

    Likewise, Regulators should include cybersecurity experts in their consultation, to ensure that they fully understand cybersecurity risks and factors, as well as any unintended consequences to regulations written with too broad, or too narrow a scope.

    At the same time, financial service providers should keep in mind that regulations typically lag technology by three to four years. That means they need to go beyond simply complying with cybersecurity regulations. They need to take additional steps to ensure their organizations are as secure as their risk assessments suggest they need to be.

    About Tom Gilheany

    Tom Gilheany is Cisco’s Product Manager for Security Training and Certifications.  He has a diverse background in startups through multinational Fortune 100 companies. Combining over 20 years of product management and technical marketing positions, and over a dozen years in IT sand Operations, he has conducted nearly 50 product launches in emerging technologies, cybersecurity, and telecommunications.  Tom holds a CISSP, an MBA, and is an active board member of the Silicon Valley Product Management Association and Product Camp Silicon Valley.

    By Tom Gilheany, Product Manager, Learning@Cisco

    You don’t have to look far to find examples of cybercrime in the financial services space.For instance, back in January, Lloyds Banking Group was the target of an online attack.

    Tom Gilheany

    Tom Gilheany

    The 48-hour fiasco involved cybercriminals trying to block access to 20 million U.K. accounts.The hackersaimed to do that by running denial of service attacks.

    The good news is that no accounts were hacked, and Lloyds did not pay a ransom.The bad news is that the attacks temporarily blocked some customers from logging on, and that we have yet another reminder that the financial services sector must beever vigilant about cybersecurity.

    Indeed, the past year helped illustrate just how at risk we all are.

    2016 in cybercrime

    There was something like 3,000 publicly disclosed data breaches worldwide in 2016. That exposed about 2.2 billion records. publicly

    Yahoo was the subject ofthe largest hack in history. That moved Verizon to reconsider its offer price for the company.

    Distributed denial of service attacks demonstrated how the Internet of Things can be enlisted to do damage to targeted systems.

    Cybersecurity was even a theme in the U.S. presidential election.

    Ransomware was also center stage in 2016. Yielding high profits to cybercriminals, it’s expected to stay there in the months ahead.

    In the first quarter of 2016 alone there was an average of over 4,000 attacks per day, according to Deloitte. That was a 300 percent increase from the 1,000 ransomware attacks per day the prior year.

    In fact, ransomware is now considered the top cybersecurity threat to the financial industry.

    Fifty-five percent of the financial services firms surveyed by SANS recently said they consider ransomware the biggest threat to their business. And more than 32 percent of financial firms said ransomware attacks have resulted in losses of between $100,000 and $500,000.

    The money and reputations at stake from cyberattacks, and the attention these activities are getting in the press, are making thisa very high stakes game. So high stakes, in fact, that regulators are expected to play a growing role in it going forward.

    Of course, the Cybersecurity Act of 2015is already in place. That encourages voluntary sharing of cyberthreat information between private entities and the federal government, as well as within agencies of the federal government.

    The scope and language of that law is very general, however.

    New financial cybersecurity regulations in 2017

    Now the incoming administration, which already voiced its interest in cybersecurity during the president campaign, has the opportunity to add some meat to these bones. The incoming administration is not expected to be heavy handed with regulations;however, the high-profile subject of cybersecurity could be the exception.

    But whoever takes the lead on it, authoring cybersecurity regulation would enable those individuals to make their mark on a high-profile issue that’s getting a whole lot of attention.

    We’ve already seen a fair amount of actual movement on this front.

    The Group of Seven industrial powers in October agreed on guidelines to protect the global financial sector from cyberattacks. That followed various cross-border bank thefts at the hands of hackers.

    “Increasing in sophistication, frequency, and persistence, cyber risks are growing more dangerous and diverse, threatening to disrupt our interconnected global financial systems and the institutions that operate and support those systems,” the G7 document notes.

    Down under, Australia has developed a national strategy through which government and the private sector are working together to address cybersecurity. Last year it issued a white paper describing major risks and initiatives on this front. And a few years ago it created the Australian Cyber Security Centre, an initiative to make the country’s networks harder to compromise.

    Meanwhile, the European Union has approved cybersecurity rules that force businesses to strengthen their defenses. They require banking, energy, and major tech companies to report attacks. And they talk about how EU nations must cooperate on network security matters.

    The European Union’s General Data Protection Regulation required four years of negotiation and about 4,000 amendments before being passed, according to Financier Worldwide.

    “Financial institutions and service providers to the financial industry process a vast amount of personal data on a daily basis,” notes the article. “Much of the data processed is confidential and sensitive. This means there are increased risks and a likelihood of a focus on this sector by supervisory authorities, which will have new rights to audit and to impose administrative fines. Indeed, the GDPR allows for administrative fines which can amount to a maximum of €20m or 4 percent of the global annual turnover of a company.”

    And at least 28 U.S. states last year considered or introduced cybersecurity legislation, according to The National Conference of State Legislatures.

    Most of these laws and bills address national infrastructure and governmental agencies. But some of them specifically target the interests of organizations, including financial service organizations.

    For example, one of the three cybersecurity bills signed into law in California last year makes it a crime for a person to knowingly introduce ransomware into any computer, computer system, or computer network.

    A new law in Coloradocalls for the creation of a state cybersecurity council to provide policy guidance to the governor. That council will also coordinate with the general assembly and the judicial branch regarding cybersecurity.

    Utah has enacted civil penalties for hackers.And Washington State has established the State Cybercrime Act.

    Looking ahead

    That said, financial services with a stake in cybersecurity and related regulations – which is to say most of them – need to be ready for what’s happening on that front.

    Banks that aren’t already involved in the cybersecurity discussion may want to start voicing their opinions and offering a hand on these efforts now, before cybersecurity regulatory decisions are cemented.

    Likewise, Regulators should include cybersecurity experts in their consultation, to ensure that they fully understand cybersecurity risks and factors, as well as any unintended consequences to regulations written with too broad, or too narrow a scope.

    At the same time, financial service providers should keep in mind that regulations typically lag technology by three to four years. That means they need to go beyond simply complying with cybersecurity regulations. They need to take additional steps to ensure their organizations are as secure as their risk assessments suggest they need to be.

    About Tom Gilheany

    Tom Gilheany is Cisco’s Product Manager for Security Training and Certifications.  He has a diverse background in startups through multinational Fortune 100 companies. Combining over 20 years of product management and technical marketing positions, and over a dozen years in IT sand Operations, he has conducted nearly 50 product launches in emerging technologies, cybersecurity, and telecommunications.  Tom holds a CISSP, an MBA, and is an active board member of the Silicon Valley Product Management Association and Product Camp Silicon Valley.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostTHAMES CARD TECHNOLOGY CAPITALISES ON STRONG 2016 WITH £2M MACHINERY INVESTMENT
    Next Technology PostCYBERSECURITY INCIDENT DATA SHOWS NEED FOR CUSTOMIZED, ENTERPRISEWIDE PLANS TO COMBAT NETWORK INTRUSIONS

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts