Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > Security from the start – tackling future threats head-on
    Technology

    Security from the start – tackling future threats head-on

    Security from the start – tackling future threats head-on

    Published by Jessica Weisman-Pitts

    Posted on February 2, 2022

    Featured image for article about Technology

    By Stephen De Vries, CEO, IriusRisk 

    We began 2021 with Microsoft president Brad Smith describing the previous year’s SolarWinds hack as the “most sophisticated attack the world has ever seen”. Cyber criminals don’t rest on their laurels, of course, so there’s every reason to believe attacks will only become advanced as we enter 2022.

    It’s vital, therefore, that companies – especially those in “under threat” industries, such as financial services – take steps to enhance their security posture.

    Built-in security 

    Companies should consider taking a “shift left” approach to cyber security, in which security is built into the design of software and applications, rather than being added as an afterthought.  One benefit of embedding security into existing developer workflows in this way is the time and cost savings it delivers; identifying potential security risks early in the design process can speed up time to deployment.

    More importantly, though, this approach ensures that software isn’t launched with high-risk design flaws that would need to be fixed in post-development or, worse, that potentially couldn’t be identified at all through application security scanning. Either way, the software would be left vulnerable to exploitation – something that could be avoided with the early visibility that shifting left offers.

    Managing insurance premiums

    In addition to the threats that cyber attacks represent to a company’s network and the sensitive data it contains, there are also more practical, financial considerations to take into account. Largely due to the growing number of ransomware attacks – and the massive financial pay-outs these have led to – cyber insurers are increasingly looking for ways in which to increase their customers’ premiums.

    One way in which companies can potentially bring these costs down is to employ threat modelling, enabling them to see how different scenarios play out. By understanding risks they face, and just where those risks are, these companies will be better able to mitigate against them. Indeed, in an increasingly sophisticated threat landscape, the ability to demonstrate this awareness is likely to become ever more important to cyber insurers in 2022 and beyond.

    Identifying and remediating threats

    It’s important for businesses, especially those that are at a particularly high risk of attack, to engage with threat modelling as early as possible, in order to understand potential risks before they become incidents.

    By combining it with the shift left approach mentioned earlier, organisations can begin threat modelling from day one of development. This will enable them to gain quick wins by quickly identifying and remediating potential vulnerabilities, and speeding up time to deployment, all while ensuring the highest level of security in their products.

    Automation will improve the process further. By relieving the burden of security workloads for both security architects and engineers, it means that companies are better able to keep pace with the cadence of software rollouts, suggesting the appropriate security mitigations to take as the software evolves. In addition, it can remove the bottleneck commonly created by security testing. By gathering security requirements prior to development, any risks can be mitigated before a single line of code is even written.

    Industries at risk 

    As a result of the financial and personal information they hold, businesses in the financial services industry are the most targeted by cyber criminals, with ransomware a particularly popular attack vector. The banking industry experienced an incredible 1,318 percent year-on-year increase in ransomware attacks in the first six months of 2021. The number of business email compromise (BEC) incidents grew too, with senior executives targeted in phishing attacks designed to trick them into transferring funds or revealing sensitive information.

    Unfortunately, a perfect storm of unsecured communications, undetected software vulnerabilities, and a lack of two-factor authentication and general security hygiene among employees, means these attacks will only continue to grow if they’re not identified and dealt with early on. The same is true of government software and applications. According to Microsoft’s Digital Defence Report, nearly 80 percent of nation-state attacks in 2021 were targeted at government-related organisations in attempts to steal or compromise highly sensitive data.

    Time for action 

    It’s clear that organisations across a range of industries are facing a serious – and growing – risk of cyber-attack. Speed and visibility are key to identifying and mitigating these risks, to prevent data breaches or businesses being held to ransom, not to mention higher insurance premiums. Threat modelling, built into an organisation’s software from the start, can offer this speed and visibility

    Threats are likely to become even more sophisticated over the coming months. It’s time that businesses everywhere take steps to ensure their security posture is up to the job.

    By Stephen De Vries, CEO, IriusRisk 

    We began 2021 with Microsoft president Brad Smith describing the previous year’s SolarWinds hack as the “most sophisticated attack the world has ever seen”. Cyber criminals don’t rest on their laurels, of course, so there’s every reason to believe attacks will only become advanced as we enter 2022.

    It’s vital, therefore, that companies – especially those in “under threat” industries, such as financial services – take steps to enhance their security posture.

    Built-in security 

    Companies should consider taking a “shift left” approach to cyber security, in which security is built into the design of software and applications, rather than being added as an afterthought.  One benefit of embedding security into existing developer workflows in this way is the time and cost savings it delivers; identifying potential security risks early in the design process can speed up time to deployment.

    More importantly, though, this approach ensures that software isn’t launched with high-risk design flaws that would need to be fixed in post-development or, worse, that potentially couldn’t be identified at all through application security scanning. Either way, the software would be left vulnerable to exploitation – something that could be avoided with the early visibility that shifting left offers.

    Managing insurance premiums

    In addition to the threats that cyber attacks represent to a company’s network and the sensitive data it contains, there are also more practical, financial considerations to take into account. Largely due to the growing number of ransomware attacks – and the massive financial pay-outs these have led to – cyber insurers are increasingly looking for ways in which to increase their customers’ premiums.

    One way in which companies can potentially bring these costs down is to employ threat modelling, enabling them to see how different scenarios play out. By understanding risks they face, and just where those risks are, these companies will be better able to mitigate against them. Indeed, in an increasingly sophisticated threat landscape, the ability to demonstrate this awareness is likely to become ever more important to cyber insurers in 2022 and beyond.

    Identifying and remediating threats

    It’s important for businesses, especially those that are at a particularly high risk of attack, to engage with threat modelling as early as possible, in order to understand potential risks before they become incidents.

    By combining it with the shift left approach mentioned earlier, organisations can begin threat modelling from day one of development. This will enable them to gain quick wins by quickly identifying and remediating potential vulnerabilities, and speeding up time to deployment, all while ensuring the highest level of security in their products.

    Automation will improve the process further. By relieving the burden of security workloads for both security architects and engineers, it means that companies are better able to keep pace with the cadence of software rollouts, suggesting the appropriate security mitigations to take as the software evolves. In addition, it can remove the bottleneck commonly created by security testing. By gathering security requirements prior to development, any risks can be mitigated before a single line of code is even written.

    Industries at risk 

    As a result of the financial and personal information they hold, businesses in the financial services industry are the most targeted by cyber criminals, with ransomware a particularly popular attack vector. The banking industry experienced an incredible 1,318 percent year-on-year increase in ransomware attacks in the first six months of 2021. The number of business email compromise (BEC) incidents grew too, with senior executives targeted in phishing attacks designed to trick them into transferring funds or revealing sensitive information.

    Unfortunately, a perfect storm of unsecured communications, undetected software vulnerabilities, and a lack of two-factor authentication and general security hygiene among employees, means these attacks will only continue to grow if they’re not identified and dealt with early on. The same is true of government software and applications. According to Microsoft’s Digital Defence Report, nearly 80 percent of nation-state attacks in 2021 were targeted at government-related organisations in attempts to steal or compromise highly sensitive data.

    Time for action 

    It’s clear that organisations across a range of industries are facing a serious – and growing – risk of cyber-attack. Speed and visibility are key to identifying and mitigating these risks, to prevent data breaches or businesses being held to ransom, not to mention higher insurance premiums. Threat modelling, built into an organisation’s software from the start, can offer this speed and visibility

    Threats are likely to become even more sophisticated over the coming months. It’s time that businesses everywhere take steps to ensure their security posture is up to the job.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostHow IoT manufacturers can dynamically prioritise security
    Next Technology PostThe main obstacle to digital transformation? The people

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts