Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Banking > FOXES GUARDING THE HENHOUSE: TACKLING INSIDER THREATS IN THE BANKING SECTOR
    Banking

    FOXES GUARDING THE HENHOUSE: TACKLING INSIDER THREATS IN THE BANKING SECTOR

    Published by Gbaf News

    Posted on February 6, 2015

    6 min read

    Last updated: January 22, 2026

    An illustration depicting the threat of credit card data theft as the shopping season approaches. This image highlights the urgency for retailers to enhance security measures to prevent financial crime.
    Credit card data theft during holiday shopping season - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    By Piers Wilson, head of product management, Tier-3 Huntsman

    Large scale cyber-attacks led by skilled hackers using ultra-sophisticated malware and zero day vulnerabilities are never far from the headlines at the moment. High profile cases such as the gang that was recently arrested for scamming £1.6 million from ATMs using malware serve as a reminder for financial institutions on the need to stay ahead of those trying to break through their perimeter. Unfortunately, they also cause us to focus attention on the outside threats and overlook those a little closer to home. Insiders, however, represent a significant problem for financial institutions, as well; a 2013 report by AlgoSecfound that almost two-thirds of organisations rate insiders as their greatest risk. So what are they doing about it?

    Financial services firms are a hugely lucrative target for cyber-criminals, so it’s no surprise that they’ve built up a huge array of network security systems and controls; such as data loss prevention (DLP) systems, encryption, firewalls, IDS and anti-virus packages. As the headlines attest, however, these defences are failing to deliver total security.

    Bill Anderson from Oculis Labs hit the nail on the head when he said that whilst a focus on network security might keep out external attackers, it won’t be enough to prevent insider-driven breaches. The problem is that the majority of network security solutions are only geared-up to identify the known threats, which leaves organisations open and vulnerable to unknown threats, such as those that are deliberately targeted to circumvent existing security efforts.

    Going for the gold: rise of the inside job

    Piers Wilson, head of product management, Tier-3 Huntsman

    Piers Wilson, head of product management, Tier-3 Huntsman

    Before they can tackle insider threats effectively, financial organisations must understand where the risks lie and how they’re created. The obvious reason is that insiders have special privileges that external attackers do not. They already have “legitimate” access to the network and systems and can compromise sensitive data all too easily; sometimes even without intending to, through ignorance, negligence, or just plain carelessness.

    The problem is exacerbated further by the decreasing number of staff resources that organisations now have, with many employees being replaced by contractors, third party support personnel and service providers. For example, cloud-based IT services are typically staffed by non-employees, who administer service platforms that are beyond both the control and visibility of the organisation. Systems that depend solely on the cloud service provider for security can therefore, perhaps unknowingly, create very broad insider risks in this sense.

    It is also a real challenge to address every eventuality in which an insider could be acting against the organisation. Since different insiders have differing motives, skill sets, risk profiles and access privileges, the controls put in place to address one scenario may be completely ineffective in another.

    For instance, IT security teams must choose effective controls to deal with a diverse range of situations that could include:

    • Data breaches that are accidental or caused by ignorance;
    • Breaches that are opportunistic or planned and deliberate;
    • Breaches made possible by misconfigured systems;
    • Breaches that result from an administrator circumventing stringent controls;
    • Breaches that result from inappropriate levels of privilege for insiders

    Sometimes insider threats are viewed as application-level or fraud issues resulting from identity management problems; whereas cyber-security refers to more highly technical external ones.  This can mean that institutions fail to counter a targeted, technical and motivated internal actor.  The reality is that all these can be damaging and costly.

    Sealing the vault: tackling the insider threat

    There have been many attempts to tackle this broad range of insider threats head-on. For example, the FBI tried to develop a tool that could predict insider behaviour and stop cybercriminals before they could do any harm, but the results met with little success. It has since moved to a behavioural baselining methodology to detect anomalous insider activity as it occurs. This approach monitors how IT users are operating on the system and identifies when that activity is abnormal. The FBI’s CSO claims that this approach is far more effective. When combined with machine learning and activity profiling, Behaviour Anomaly Detection solutions like this can quickly detect an indicator of compromise that could signpost a potential malicious insider threat and alert the IT security teams, allowing them to take action before it is too late.

    There are also more fundamental processes that can be implemented in order to reduce the threat from malicious insider activity. For example, it is essential to set access rights based on user roles, so that only those employees that have a real need to access a given resource have the ability to do so. If an employee doesn’t need access to customer bank accounts or trading secrets, then their access privileges shouldn’t permit it. Separating duties can also prevent subversion or collusion, and avoids implicating personnel in activities in which they had no part. The most useful controls are those that provide evidence to support their operation, which is generated continuously through normal use; such as collection and regular analysis of event logs and system/network activity.

    In most cases, victims of insider breaches could have found evidence of data breaches in their log files, if only they had looked. For example, if a certain user is accessing a significant number of documents that aren’t reasonably within their remit, then the alarm would be triggered and the breach responded to quickly. Imagine the problems that this approach could help to avoid by detecting insiders like JérômeKerviel, who infamously cost French bank SociétéGénérale an astonishing €4.9 billion through abusing his access privileges to IT systems.

    What this all adds up to is the need for financial organisations to avoid over-reliance on network security systems and signature-based tools to focus on the early detection of indicators of compromise, investigation and verification of those risks to the enterprise. This will enable them to take the appropriate action to deal with any given threat, regardless of the source or motive. By dealing with the disease rather than the symptoms, proactive technologies enable alerting the instant that systems, processes or people behave abnormally. This is often the first and clearest indicator that something’s not as it should be.

    More from Banking

    Explore more articles in the Banking category

    Image for Latin Securities Named Winner of Two Prestigious 2026 Global Banking & Finance Awards
    Latin Securities Named Winner of Two Prestigious 2026 Global Banking & Finance Awards
    Image for Pix at five years: how Brazil built one of the world’s most advanced public payments infrastructures - and why other countries are paying attention
    Pix at five years: how Brazil built one of the world’s most advanced public payments infrastructures - and why other countries are paying attention
    Image for Idle Stablecoins Are Becoming a Systemic Efficiency Problem — and Banks Should Pay Attention
    Idle Stablecoins Are Becoming a Systemic Efficiency Problem — and Banks Should Pay Attention
    Image for Banking Without Boundaries: A More Practical Approach to Global Banking
    Banking Without Boundaries: A More Practical Approach to Global Banking
    Image for Lessons From the Ring and the Deal Table: How Boxing Shapes Steven Nigro’s Approach to Banking and Life
    Lessons From the Ring and the Deal Table: How Boxing Shapes Steven Nigro’s Approach to Banking and Life
    Image for The Key to Unlocking ROI from GenAI
    The Key to Unlocking ROI from GenAI
    Image for The Changing Landscape of Small Business Lending: What Traditional Finance Models Miss
    The Changing Landscape of Small Business Lending: What Traditional Finance Models Miss
    Image for VestoFX.net Expands Education-Oriented Content as Focus on Risk Awareness Grows in CFD Trading
    VestoFX.net Expands Education-Oriented Content as Focus on Risk Awareness Grows in CFD Trading
    Image for The Hybrid Banking Model That Digital-Only Providers Cannot Match
    The Hybrid Banking Model That Digital-Only Providers Cannot Match
    Image for INTERPOLITAN MONEY ANNOUNCES RECORD GROWTH ACROSS 2025
    INTERPOLITAN MONEY ANNOUNCES RECORD GROWTH ACROSS 2025
    Image for Alter Bank Wins Two Prestigious Awards in the 2025 Global Banking & Finance Awards®
    Alter Bank Wins Two Prestigious Awards in the 2025 Global Banking & Finance Awards®
    Image for CIBC wins two Global Banking and Finance Awards for student banking
    CIBC wins two Global Banking and Finance Awards for student banking
    View All Banking Posts
    Previous Banking PostCOMPASS PLUS SURVEY REVEALS THE GROWTH OF THE MULTI-CHANNEL CONSUMER
    Next Banking PostYES BANK: CASE STUDY