Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >Navigating digital transformation in an evolving regulatory and cyber threat landscape
    Technology

    Navigating Digital Transformation in an Evolving Regulatory and Cyber Threat Landscape

    Published by Jessica Weisman-Pitts

    Posted on February 8, 2022

    6 min read

    Last updated: February 9, 2026

    Add as preferred source on Google
    An abstract representation of digital data flow symbolizes the rapid pace of technological change and the increasing cyber threats faced by regulators. This image relates to the challenges of digital transformation and compliance in the banking and finance sector.
    Digital data flow representing cyber threats and regulatory change - Global Banking & Finance Review
    Tags:cybersecuritycomplianceDigital transformationauthenticationfinancial services

    By Nic Sarginson, Principal Solutions Engineer, at Yubico

    Digital transformation strategies have contributed to a fast pace of technological change. With this comes an ever-increasing frequency of cyber-attacks as attackers look to exploit and circumnavigate new technologies. To counteract this, global regulators and policymakers have been enacting or modifying laws to protect sensitive and critical data at all levels. For example, the EU General Data Protection Regulation (GDPR) became the gold standard for data protection and user privacy, ushering in a rapid pace of regulatory change.

    Recently, the Covid-19 pandemic has accelerated global digital transformation efforts as businesses around the world had to rapidly adapt and digitise. This has resulted in greater pressure on regulators and policymakers to protect the public from the risks associated with this “new normal”. As an example, in 2021 President Biden enacted an executive order to improve cybersecurity initiatives throughout the US. This is a powerful example of the fact that these issues are a matter of national security. That pressure is in turn transferred to security teams who must meet the burden of compliance.

    Key regulatory changes

    Protecting citizens and services, especially those that are critical, from attacks is undoubtedly an ongoing battle for regulators and policymakers. In fact, many government agencies tend to fall victim to the same attacks, as they hold large quantities of valuable data. With technology advancing, regulation must also keep pace so that organisations can be protected against increasingly sophisticated and frequent cyberattacks.

    The biggest regulatory change in recent years was the introduction of GDPR in 2018. This enforced major changes in data protection and privacy, stressing the importance of security measures and governing how data and customer information is managed by companies. Within some sectors, regulation standards require authentication methods and secure access controls to be implemented when handling critical and classified data.

    Yet not all authentication methods provide equal protection against today’s cyber threats. While basic authentication such as the username and password combination, and even forms of two-factor authentication (2FA) such as SMS-based one-time passcodes (OTPs) are better than nothing, they are not sufficiently strong enough when it comes to protecting data, systems, and applications from attackers. In response, industry regulations are beginning to address authentication minimum standards for access and control, while others are relying on frameworks, like Zero Trust, to provide guidance.

    In June 2021, the EU Commission revealed its plans to revise the electronic IDentification, Authentication and trust Services (eIDAS) mandate, aimed to ensure secure digital interactions between organisations, government authorities, and individuals when travelling. This regulation will pertain to online authentication, digital signatures, and national electronic ID policies.

    The profile of an attack

    The pandemic has accelerated growth in cybercrime at an ‘alarming rate’. With organisations rapidly deploying remote systems and networks to support home working, attackers have taken advantage of increased security vulnerabilities. Once a target has been compromised, cybercriminals have the freedom to seek out and obtain valuable digital assets from companies, particularly those with weak authentication and access credentials. There are a wide range of methods cybercriminals can utilise that are programmed specifically to steal the credentials of companies with poor and inadequate security measures in place.

    For example, Man in the middle (MitM) attacks where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other. Password spraying occurs when naïve online users choose generic or commonly used passwords when creating their various accounts. With this, cybercriminals can then try these passwords against the users’ accounts to gain access to their private information.

    SIM swapping happens when an attacker tricks a mobile provider into changing a target’s mobile number to a SIM card that the attacker can control. Both the user and the authentication device (their phone) have been cloned essentially and services are simply replying on that number. From there, OTPs and other credential verifications meant for the original user are instead directed to the attacker.

    Phishing works by posing as a trusted or legitimate source, usually by email and tricking a target into opening a website or link provided. The target will then be prompted to provide their login details to what is believed to be a trusted website and unknowingly share their information with the attacker. Use of this method is very widespread and commonly experienced.

    Solutions to implement

    The most basic level of 2FA along with traditional usernames and passwords, are not as advanced in protecting data and from the level of sophistication by modern cyberthreats. To better protect themselves while continuing with new digital transformation processes, organisations should consider adopting newer methods of stronger authentication and security that can effectively withstand and prevent emerging cyber threats.

    Multi-factor authentication (MFA) and strong 2FA have been proven to offer this, requiring users to provide more than just one verification step to prove their identity. To best safeguard individuals’ and organisations’ data, and prevent mass disruptions to public services, security protocols need to incorporate stronger authentication and comply with government regulations. Enhanced verification through hardware-based authentication and FIDO2, as examples, can further counteract attempts to compromise security credentials.

    Such innovative devices have been able to combat MitM attacks and phishing while stopping organisations from being compromised. As part of their digital transformation initiatives, in October 2021 Google announced plans to auto-enrol 150 million of its users into a 2FA programme and to make it a required process for two million of its YouTube creators.

    With such a high proportion of cyber-attacks focusing on credential theft, strong authentication holds the key to drastically reducing the impact. As organisations embark on digital transformation initiatives, they must ensure that they are deploying security programmes which both comply with regulations and incorporate strong authentication to thwart attacks. Additional verification via hardware-based authentication, for instance, helps to counteract the risks associated with stolen credentials. Hardware-backed security devices are leading the way in eliminating phishing and MitM attacks, protecting users from having their credentials compromised and organisations from being breached.

    Frequently Asked Questions about Navigating digital transformation in an evolving regulatory and cyber threat landscape

    1What is digital transformation?

    Digital transformation refers to the integration of digital technology into all areas of a business, fundamentally changing how it operates and delivers value to customers.

    2What is cybersecurity?

    Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks, which aim to access, change, or destroy sensitive information.

    3What is GDPR?

    The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy, establishing guidelines for the collection and processing of personal information.

    4What is multi-factor authentication (MFA)?

    Multi-factor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify a user's identity.

    5What is phishing?

    Phishing is a cyber attack that attempts to steal sensitive information such as account credentials or credit card numbers by masquerading as a trustworthy entity in electronic communications.

    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Technology

    Explore more articles in the Technology category

    Image for Innovation Through Partnership: The Role of External Tech Teams
    Innovation Through Partnership: The Role of External Tech Teams
    Image for Nominations Open for Technology Awards 2026
    Nominations Open for Technology Awards 2026
    Image for Nominations Open for Innovation Awards 2026
    Nominations Open for Innovation Awards 2026
    Image for Archie earns industry recognition across G2, Capterra, and SoftwareReviews
    Archie Earns Industry Recognition Across G2, Capterra, and SoftwareReviews
    Image for The Bankaool Transformation: How a Regional Mexican Bank Became a Fintech Disruptor
    The Bankaool Transformation: How a Regional Mexican Bank Became a FinTech Disruptor
    Image for Submit Your Entry Today for Digital Banking Awards 2026
    Submit Your Entry Today for Digital Banking Awards 2026
    Image for Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Image for Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Image for Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Image for Entrepreneurial Discipline in the AI Economy: Insights from Dmytro Lavryniuk
    Entrepreneurial Discipline in the AI Economy: Insights From Dmytro Lavryniuk
    Image for Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Image for Call for Entries: Best Digital Wallet 2026
    Call for Entries: Best Digital Wallet 2026
    View All Technology Posts
    Previous Technology PostCyber Security (authentication) Trends for 2022
    Next Technology PostHow Fraud Teams Can Help Banks Solve the Digital Identity Crisis