Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > TAKING CONTROL OF CYBER SECURITY
    Technology

    TAKING CONTROL OF CYBER SECURITY

    TAKING CONTROL OF CYBER SECURITY

    Published by Gbaf News

    Posted on July 21, 2016

    Featured image for article about Technology

    Nick Pollard, UK General Manager, Guidance Software 

    Nick Pollard

    Nick Pollard

    Targeted cyberattacks on financial institutions show no signs of abating. A recent reportfrom lobby group TheCityUKwarned that the financial sector is “the perfect target” for cyber crimeand it’s been estimated that financial services businesses encounter security incidents 300% more frequently than other industries.

    This, perhaps, stands to reason; attackers will focus their efforts on the most lucrative targets–from attacks on payment systems to the theft of high value, high worth PII (personally identifiable information).  As such, the sector is facing ever-mounting challenges in managing cyber risks, perpetrated by well-resourced and well-organised criminal gangs. The impact of their activities can be devastating,as was evident earlier this year when criminals used malware to hack the Bangladesh Central Banks’ SWIFT messaging network, stealing £56 million.

    The reality is that attacks such as these will become more pervasive as criminals turn their attention to digital crime. In the face of more complex challenges, there are no quick-fix answers. However, the industry can take measures to improve the way in which sensitive data is audited, tracked and controlled. Combined with fit-for-purpose detection and incident response strategies, a deep understanding of data will help reduce the surface area of risk and can mitigate the damage if a breach does occur.

    Know Your Data 

    No amount of threat detection or prevention can make a system 100% secure. Teams charged with managing the protection of customer data face a perfect storm of increasingly sophisticated threats like ransomware, zero day exploits, phishing scams, bots and more. Banks rightfully invest millions into cybersecurity tools to detect and prevent attacks.However, attackers can, and will, exploit vulnerabilities (technological or human) that exist in any system.

    Defending digital assets is a complex challenge and a successful attack can cause significant damage in terms of the direct financial cost from theft, or loss of data, but also the wider impact from consequent loss of business, legal, regulatory and reputational costs.Taken together, these impacts create a significant amount of risk for any organisation, and especially for the financial sector. The best foundation for limiting risk and improving resilience is taking a thorough audit of your most important digital asset: your data. This is no small task; there is more data held, across more locations, and on more endpoint devices than ever before. Add to that the host of digital information that can be shared tothe cloud, via email and even with social media, and the challenge of tracking data is further exacerbated.

    When conducting an audit, start by ensuring that data maps are up-to-date, that all data repositories have the correct control polices and that, above all, you fully understand where the most critical data is stored. Identify where any ‘unsecured’ data is being held and conduct regular sweeps across the network to get the full picture of data locations.

    Ensure that all the correct policies for data access, data governance and data protection are not only implemented, but also enforced.

    Early Warning

    Proactively,financial institutions should look to monitor activity and establish what normal activity looks like for their endpoint devices and servers. With a baseline of normal activity, an organisation can more quickly identify indicators of compromise (IoCs) by identifying abnormal behaviours either by systems or employees that could pose a risk. Leveraging data from all servers and end-user devices, endpoint security analytics can give complete visibility of endpoint activities across the network, in order to detect any anomalous behaviour, areas of potential risk, and security threats before damage can spread.

    Stress-Test Incident Response Plans 

    Even when incident response (IR) measures are in place, all too often the processes for knowing the lines of decision making, the communications processes and which systems to shut down have not been thoroughly practised. Although many organisations may think that they have robust security policies in place, how well-drilled are they at responding to security incidents when these occur? All too frequently, it isn’t until a real world incident occurs that the shortcomings of plans are uncovered.

    The most significant starting point for determining the scale of a threat is assessing the type of data that has been targeted, which is why it’s important to have mapped exactly where sensitive data is held, and to prioritise responses based on these sensitive data profiles. This can save significant time in data ‘stock-taking’ that would need to be performed in the immediate aftermath of a cyber-attack.

    Mitigating the risk and impact of breaches requires a coordinated, well-planned and fully practised security strategy. Whilst attacks are on the rise, we shouldn’t wait for the ‘hit’. It’s more important than ever to be proactive, taking all necessary measures to identify and secure data, spot the warning signs of attacks and implement the appropriate response should any incident occur.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostFROM BOTS TO BLOCKCHAIN, CONNECTED CLOUD TO CONNECTED CARS, SAGE SETS OUT ITS VISION FOR THE TECH REVOLUTION
    Next Technology PostTHE CAR FINANCE INDUSTRY IS IN DIRE NEED OF DISRUPTION, FINANCIAL TECHNOLOGY FIRM INTELLIGENT ENVIRONMENT SAYS

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts